The dangers of cryptocurrency phishing are back in the news, after tech investor Mark Cuban was reported to have lost around $870k via a phishing link. Cuban lost a combination of coin types as asset movement flagged up after months of inactivity from his wallet.
Cuban discovered some of the transactions taking place and was able to save about $2.5m of token
Leading Android health apps expose users to avoidable threats like surveillance and identity theft, due to their risky permissions. Cybernews has the story.
The Android challenge
In the digital age, mobile applications have become an integral part of our lives, transforming the way we communicate, work, and entertain ourselves. With the vast array of
Microsoft's September 2023 Patch Tuesday is another important one. Not because it's a busy one, but because we have some special cases. Patch Tuesday includes security updates for 59 bugs, two of which are known to be actively exploited.
The Cybersecurity & Infrastructure Security Agency (CISA) has added these two vulnerabilities to its Known Exploited V
Authored by Joshua Kamp (main author) and Alberto Segura.
Summary
Hook and ERMAC are Android based malware families that are both advertised by the actor named “DukeEugene”. Hook is the latest variant to be released by this actor and was first announced at the start of 2023. In this announcement, the actor claims that Hook was written from scratch [1].
Google released September 2023 Android security updates to address multiple flaws, including an actively exploited zero-day.
Google released September 2023 Android security updates that address tens of vulnerabilities, including a zero-day flaw tracked as CVE-2023-35674 that was actively exploited in the wild.
This high-severity vulnerability CVE-2023
Russia-linked threat actors have been targeting Android devices of the Ukrainian military with a new malware dubbed Infamous Chisel.
GCHQ’s National Cyber Security Centre and international partners reported that Russia-linked threat actors are using a new malware to target the Ukrainian military
Government experts attribute the attack to the Russian m
Threat actors are using Android Package (APK) files with unsupported compression methods to prevent malware analysis.
On June 28th, researchers from Zimperium zLab researchers observed that Joe Sandbox announced the availability of an Android APK that could not be analyzed from most of the anti-decompilation tools.
What is the best way to bypass #Ma
Background:
On June 28th, Zimperium zLab researchers observed that Joe Sandbox published a tweet that mentioned an application package file (APK) that could not be analyzed from most of the anti-decompilation tools, but could be installed on Android devices whose OS version is above Android 9 Pie (API 28). This sample uses a technique that limits the poss
Publish At:
2023-08-17 12:54 |
Read:167399 | Comments:0 |
Tags:
android
Experts found 43 Android apps in Google Play with 2.5 million installs that displayed advertisements while a phone’s screen was off.
Recently, researchers from McAfee’s Mobile Research Team discovered 43 Android apps in Google Play with 2.5 million installs that loaded advertisements while a phone’s screen was off.
The experts pointed out
With every new software update, smartphone manufacturers are looking for ways to make our lives easier, more efficient and safer. So when Google released a new Android feature to automate calls to the emergency services, it was expected to be a massive success. But reports from UK police suggests that the Emergency SOS function is actually a serious problem.
Threat actors rely on the ‘versioning’ technique to evade malware detections of malicious code uploaded to the Google Play Store.
Google Cybersecurity Action Team (GCAT) revealed that threat actors are using a technique called versioning to evade malware detection implemented to detect malicious code uploaded to the Google Play Store.
The
Researchers say mobile malware purveyors have been abusing a bug in the Google Android platform that lets them sneak malicious code into mobile apps and evade security scanning tools. Google says it has updated its app malware detection mechanisms in response to the new research.
At issue is a mobile malware obfuscation method identified by researchers at T
Stalkerware-type app Spyhide is coded so badly that it’s possible to gain access to the back-end databases and retrieve data about everyone that has the app on their device. And it's not a small number. Hacktivist maia arson crimew told TechCrunch she'd found 60,000 compromised Android devices, dating back to 2016.
Spyhide, like man
China-linked group APT41 was spotted using two previously undocumented Android spyware called WyrmSpy and DragonEgg
China-linked APT group APT41 has been observed using two previously undocumented Android spyware called WyrmSpy and DragonEgg.
The APT41 group, aka Winnti, Axiom, Barium, Blackfly, HOODOO) is a China-linked cyberespionage
It’s that time of the month again. For the July 2023 Patch Tuesday, Microsoft has issued security updates for 130 vulnerabilities. Nine of the vulnerabilities are rated as critical and four of them are known to be actively exploited.
The Cybersecurity & Infrastructure Security Agency (CISA) has already added these four vulnerabilities to the catalo
Announce
Share high-quality web security related articles with you:)