Android Phones Vulnerable to Cloak & Dagger attack

Millions of Android Phones including latest Versions Vulnerable to Cloak & Dagger attack

Cloak & Dagger attack discovered by security experts from Georgia Institute of Technology, which allows attackers to get complete control over your device. These attack just require two permission that, in the event that the application is installed from the...
Samsung Galaxy iris recognition can be Hacked simply

Samsung Galaxy iris recognition can be Hacked simply with Owner’s Photo

Security specialists from Chaos Computer Clubs found basic strides to break iris recognition system scanner of the new Samsung Galaxy S8. Samsung Galaxy S8 system guarantees secure individual client verification by utilizing the unique pattern of the human iris. But...

WhatsApp scam – Advertising Netflix Subscription free for a year

These days it winds up plainly normal as we see a huge increase with Scam message in Whatsapp, here is another WhatsApp scam - Advertising Netflix Subscription free for a year. For this new Whatsapp trick, fraudsters are utilizing this...
Android Permission Security Flaw

New Dangerous Android Permission Security Flaw leads to Ransomware and Banking Malware Attacks

A new Android vulnerability discovered in Android's security Mechanism which leads to several android permission based attacks during run-time including ransomware, banking malware and adware. According to the Google Policy  gives extensive permissions to apps installed directly from Google Play,this flow ...
Mobile spyware that steal Twitter credentials uses sandbox to Evade antivirus detections

Mobile spyware that steal Twitter credentials uses sandbox to Evade antivirus detections

Security Experts from Avast came through a Malware that uses a sandbox(DroidPlugin) to dynamically load and run an app, without actually installing the app, just like VirtualApp. This makes it harder for antivirus solutions for recognizing the malware, as its...

Most Popular

Recommended