Android

MalwareBytesSecurity

Mobile Menace Monday: Securing your privacy on Android

Credit to Author: Nathan Collier| Date: Mon, 24 Apr 2017 15:00:31 +0000

If you work at a company that allows you to use your mobile device to login email, access company data, and/or connect to company Wi-Fi, you could be more of a risk than you think.

Categories:

Tags:

(Read more…)

The post Mobile Menace Monday: Securing your privacy on Android appeared first on Malwarebytes Labs.

Read More
SecuritySophos

Android malware anti-emulation techniques

Credit to Author: Bill Brenner| Date: Thu, 13 Apr 2017 15:35:54 +0000

The following report is by SophosLabs Android specialist Chen Yu, with support from Android team members William Lee, Jagadeesh Chandraiah and Ferenc László Nagy. As the amount of Android malware grows, it follows every step of its Windows counterparts when it comes to techniques used to evade emulators used for dynamic analysis. In this blog post, we’ll show some […]

Read More
ComputerWorldIndependent

Notorious iOS spyware, Pegasus, has an Android sibling

Credit to Author: Michael Kan| Date: Mon, 03 Apr 2017 17:56:00 -0700

Security researchers have uncovered the Android version of an iOS spyware known as Pegasus in a case that shows how targeted electronic surveillance can be.

Called Chrysaor, the Android variant can steal data from messaging apps, snoop over a phone’s camera or microphone, and even erase itself.

On Monday, Google and security firm Lookout disclosed the Android spyware, which they suspect comes from NSO Group, an Israeli security firm known to develop smartphone surveillance products.

Fortunately, the spyware never hit the mainstream. It was installed less than three dozen times on victim devices, most of which were located in Israel, according to Google. Other victim devices resided in Georgia, Mexico and Turkey, among other countries.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Google's Android hacking contest fails to attract exploits

Credit to Author: Lucian Constantin| Date: Fri, 31 Mar 2017 11:32:00 -0700

Six months ago, Google offered to pay $200,000 to any researcher who could remotely hack into an Android device by knowing only the victim’s phone number and email address. No one stepped up to the challenge.

While that might sound like good news and a testament to the mobile operating system’s strong security, that’s likely not the reason why the company’s Project Zero Prize contest attracted so little interest. From the start, people pointed out that $200,000 was too low a prize for a remote exploit chain that wouldn’t rely on user interaction.

“If one could do this, the exploit could be sold to other companies or entities for a much higher price,” one user responded to the original contest announcement in September.

To read this article in full or to leave a comment, please click here

Read More