Tag: android
-
Love hacks Wie eine Fake-App ahnungslose Nutzer in die Falle lockt
ESET-Forscher entdecken eine Android-Spyware-Kampagne, die auf Nutzer in Pakistan abzielt und Verbindungen zu einer breit angelegten Spionageoperation aufzeigt First seen on welivesecurity.com Jump to article: www.welivesecurity.com/de/eset-research/love-hacks-wie-eine-fake-app-ahnungslose-nutzer-in-die-falle-lockt/
-
Love hacks Wie eine Fake-App ahnungslose Nutzer in die Falle lockt
ESET-Forscher entdecken eine Android-Spyware-Kampagne, die auf Nutzer in Pakistan abzielt und Verbindungen zu einer breit angelegten Spionageoperation aufzeigt First seen on welivesecurity.com Jump to article: www.welivesecurity.com/de/eset-research/love-hacks-wie-eine-fake-app-ahnungslose-nutzer-in-die-falle-lockt/
-
A fake romance turns into an Android spyware infection
ESET researchers have identified an Android spyware campaign that uses romance scam tactics to target individuals in Pakistan. The operation relies on a malicious app … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/29/ghostchat-android-romance-spyware/
-
Verbesserter Diebstahlschutz für Android-Smartphones: Welche Änderungen Google jetzt vornimmt
First seen on t3n.de Jump to article: t3n.de/news/verbesserter-diebstahlschutz-android-smartphones-1727222/
-
Phantom Malware in Android Game Mods Hijacks Devices for Ad Fraud
Another day, another Android malware strain. This time, Phantom malware (aka Android.Phantom) is targeting users who install third-party gaming apps from unofficial sources. First seen on hackread.com Jump to article: hackread.com/phantom-malware-android-game-mods-ad-fraud/
-
Android bekommt neue Sicherheitsfunktionen gegen Diebstahl
Android hat bereits einige Funktionen, die unberechtigte Zugriffe verhindern sollen – etwa bei Diebstahl. Google hat jetzt nachgelegt. First seen on golem.de Jump to article: www.golem.de/news/google-android-bekommt-neue-sicherheitsfunktionen-gegen-diebstahl-2601-204705.html
-
Android Phones Get AI-Powered Anti-Theft Features
Enhanced lockouts and stronger remote locking aim to make stolen devices far harder”, and less profitable”, for criminals. The post Android Phones Get AI-Powered Anti-Theft Features appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-android-anti-theft-features/
-
Android just got smarter at stopping snatchrun phone thefts
Google announced updates to the Android theft protection features that expand existing safeguards and make stolen devices harder to use. These updates are available on Android … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/28/google-android-theft-protection-features/
-
Android Adds ‘Accountability Layer’ to Third-Party Apps
Android is adding new verification steps to sideloaded apps, introducing friction for advanced users while aiming to reduce malware, fraud, and scams. The post Android Adds ‘Accountability Layer’ to Third-Party Apps appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-android-sideloading-verification-update/
-
WhatsApp Rolls Out Lockdown-Style Security Mode to Protect Targeted Users From Spyware
Meta on Tuesday announced it’s adding Strict Account Settings on WhatsApp to secure certain users against advanced cyber attacks because of who they are and what they do.The feature, similar to Lockdown Mode in Apple iOS and Advanced Protection in Android, aims to protect individuals, such as journalists or public-facing figures, from sophisticated spyware by…
-
Brax Open Slate: Modulares Dual-Boot-Tablet mit Android und Linux
Brax entwickelt ein neues modulares, auf Privacy fokussiertes Mobilgerät – nach dem Smartphone Brax3 kommt das Tablet Open Slate. First seen on golem.de Jump to article: www.golem.de/news/brax-open-slate-modulares-dual-boot-tablet-mit-android-und-linux-2601-204599.html
-
Machine learningpowered Android Trojans bypass script-based Ad Click detection
A new Android click-fraud trojan family uses TensorFlow ML to visually detect and tap ads, bypassing traditional script-based click techniques. Researchers at cybersecurity firm Dr.Web discovered a new Android click-fraud trojan family that uses TensorFlow.js ML models to visually detect and tap ads, avoiding traditional script-based methods. The malware is distributed via Xiaomi’s GetApps, it…
-
Keeper Introduces Instant Account Switching and Passkey Improvements
Keeper Security has announced instant account switching and passkey enhancements across its mobile applications and browser extension. This update is said to be available across all major web browsers including iOS, Android and the Keeper Browser Extension. The instant account switching enables users to securely toggle between multiple Keeper accounts on the same device or…
-
New AI-Powered Android Malware Automatically Clicks Ads on Infected Devices
A sophisticated new Android malware family dubbed >>Android.Phantom<>phantom<>signaling<< controlled from the hxxps://dllpgd[.]click command server. The ML model downloads from hxxps://app-download[.]cn-wlcb[.]ufileos[.]com and analyzes screenshots of virtual screens to identify and automatically click ad […] The post New AI-Powered Android Malware Automatically Clicks Ads on Infected Devices appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform. First…
-
WPair Scanner Released to Detect WhisperPair Flaw in Google’s Fast Pair Protocol
An open-source Android application designed to identify and test devices vulnerable to CVE-2025-36911, a critical authentication bypass flaw in Google’s Fast Pair Bluetooth protocol. The vulnerability, commonly referred to as WhisperPair, affects millions of Bluetooth audio devices worldwide, enabling unauthorised pairing and potentially granting access to microphoneswithout user consent. CVE-2025-36911 represents a significant cryptographic weakness…
-
What’s On the Tube Or Rather in the Tube: Kimwolf Targets Android-based TVs and Streaming Devices
Kimwolf botnet exploits smart gadgets for DDoS attacks, highlighting security lapses in device protection and supply chains. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/whats-on-the-tube-or-rather-in-the-tube-kimwolf-targets-android-based-tvs-and-streaming-devices/
-
Secure web browsers for the enterprise compared: How to pick the right one
Tags: access, ai, android, api, attack, browser, business, chrome, cloud, computer, control, corporate, data, encryption, endpoint, fortinet, gartner, google, guide, identity, linux, login, malicious, malware, mfa, mobile, monitoring, network, okta, phishing, saas, service, siem, software, technology, threat, tool, training, vpn, windows, zero-trustEnable MFA at the beginning of any browser session by default.Handle isolation controls both with respect to the user’s session and to isolate any application from cross-infection. This means controlling the movement of data between the browser, your particular endpoint and the web application or applications involved.Control access to web destinations, either to allow or…
-
This Intune update isn’t optional, it’s a kill switch for outdated apps
Tags: access, android, authentication, business, control, corporate, cybersecurity, data, infrastructure, malware, microsoft, mitigation, password, phone, risk, service, switch, threat, tool, updateiOS line-of-business (LOB) and custom iOS apps using the Intune App SDK must update to SDK version 20.8.0 or later for apps compiled with Xcode 16, and to 21.1.0 or later for apps compiled with Xcode 26.Apps using the wrapper must update to the new version of the Intune App Wrapping Tool for iOS: version…
-
NDSS 2025 ASGARD
Session 9B: DNN Attack Surfaces Authors, Creators & Presenters: Myungsuk Moon (Yonsei University), Minhee Kim (Yonsei University), Joonkyo Jung (Yonsei University), Dokyung Song (Yonsei University) PAPER ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environments On-device deep learning, increasingly popular for enhancing user privacy, now poses a serious risk to the privacy of…
-
NDSS 2025 ScopeVerif: Analyzing The Security Of Android’s Scoped Storage Via Differential Analysis
Session 9A: Android Security 2 Authors, Creators & Presenters: Zeyu Lei (Purdue University), Güliz Seray Tuncay (Google), Beatrice Carissa Williem (Purdue University), Z. Berkay Celik (Purdue University), Antonio Bianchi (Purdue University) PAPER ScopeVerif: Analyzing the Security of Android’s Scoped Storage via Differential Analysi Storage on Android has evolved significantly over the years, with each new…
-
Your Android App Needs Scanning Best Android App Vulnerability Scanner in 2026
Given the threat-dominating space we cannot escape, we need a game-changer that becomes the ultimate tool for protecting our Android app. Now, imagine your organisation’s application is used by hundreds and thousands of Android users, given that your flagship Android app is always running on it. How sure are you that your app security is……
-
Google plans to make Chrome for Android an agentic browser with Gemini
Google appears to be testing a new feature that integrates Gemini into Chrome for Android, allowing you to use agentic browser capabilities on your mobile device. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/artificial-intelligence/google-plans-to-make-chrome-for-android-an-agentic-browser-with-gemini/
-
Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers
The Black Lotus Labs team at Lumen Technologies said it null-routed traffic to more than 550 command-and-control (C2) nodes associated with the AISURU/Kimwolf botnet since early October 2025.AISURU and its Android counterpart, Kimwolf, have emerged as some of the biggest botnets in recent times, capable of directing enslaved devices to participate in distributed denial-of-service (DDoS)…
-
Kimwolf botnet’s swift rise to 2M infected devices agitates security researchers
The botnet took an unusual path by abusing residential proxy networks, allowing it to control an untapped collection of unofficial Android TV devices. First seen on cyberscoop.com Jump to article: cyberscoop.com/kimwolf-aisuru-botnet-lumen-technologies/
-
Android Users Hit by Volume Button Bug Linked to Select to Speak
Google has confirmed a critical bug affecting Android devices where volume buttons malfunction when the Select to Speak accessibility feature is enabled. The issue causes volume keys to adjust accessibility volume rather than media volume. It prevents the camera from capturing photos when the volume buttons are pressed during photography. Users with Select to Speak…
-
Google confirms Android bug causing volume key issues
Google has confirmed a software bug that is preventing volume buttons from working correctly on Android devices with accessibility features enabled. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/google/google-confirms-android-bug-causing-volume-key-issues/
-
Android Banking Malware deVixor Actively Targeting Users with Ransomware Capabilities.
A sophisticated Android banking trojan known as deVixor has emerged as a significant threat to mobile users, combining financial data theft, device surveillance, and ransomware capabilities into a single malicious platform. Active since October 2025, the malware represents a concerning evolution in Android-based financial threats, targeting victims through fake automotive websites and leveraging Telegram infrastructure…
-
Q4 2025 Malware Trends: Telegram Backdoor, Banking Trojans Surge, Joker Returns to Google Play
Telegram mods spread a powerful Android backdoor as banking trojans surge and Joker malware resurfaces on Google Play in Q4 2025, says Doctor Web. First seen on hackread.com Jump to article: hackread.com/q4-2025-malware-telegram-backdoor-joker-google-play/
-
3 Best Android Apps to Help College Students
For college students, it’s always difficult to keep all their lessons and homework well-organized as well as manage their time. Sometimes for some of them, it may seem that life turns into an endless circle, and every new day just looks the same as the previous one. Of course, some students try to delegate their…

