HackDig : Dig high-quality web security articles for hacker

Two Ztorg Trojans Removed from Google Play Store Are Definitely Better

For the second time in a month, Google removed malicious apps infected with the Ztorg Trojans that could allow attackers to root targeted devices. Most software developers update their apps to patch vulnerabilities and add new features. But when the software is malware, an update could be the worst thing to do. The Google Play Store is always working to prev
Publish At:2017-06-20 23:50 | Read:178 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Malware Mobile Android Cyb

Ztorg: from rooting to SMS

I’ve been monitoring Google Play Store for new Ztorg Trojans since September 2016, and have so far found several dozen new malicious apps. All of them were rooting malware that used exploits to gain root rights on the infected device. Then, in the second half of May 2017 I found one that wasn’t. Distributed on Google Play through two malicious a
Publish At:2017-06-20 08:50 | Read:189 | Comments:0 | Tags:Mobile Google Android Mobile Malware Ztorg

Mexican Government was spying on Journalists and Activists with Pegasus Surveillance software

Journalists and activists in Mexico accused the government of spying on them with the powerful surveillance software Pegasus developed by the NSO Group. Journalists and activists in Mexico accused the government of spying on them with a powerful surveillance software. According to the journalists, the authorities used an Israeli spyware to hack their mobile
Publish At:2017-06-20 05:25 | Read:157 | Comments:0 | Tags:Breaking News Digital ID Hacking Hacktivism Malware Mobile M

A New malware dubbed dvmap for android was found and removed from play store

Kaspersky Lab had discovered a new malware dubbed dvmap for Android was found and removed from the official Google Play store A New malware dubbed dvmap for Android was found and removed from the official Google Play store Kaspersky Lab had discovered the new malware that is capable of obtaining root access on Android devices and is capable of taking over th
Publish At:2017-06-16 09:20 | Read:227 | Comments:0 | Tags:Breaking News Malware Mobile Android DVMAP Hacking malware m

Thailand: police raided massive click farms with more 500k SIM cards

Thailand: Police raided massive click farms, the agents have seized nearly half a million SIM cards and hundreds of iPhones used to promote products online. Police and army troops in Thailand has raided a massive click-fraud farm, the agents have seized nearly half a million SIM cards and hundreds of iPhones used to promote products online. The authorities h
Publish At:2017-06-15 14:55 | Read:183 | Comments:0 | Tags:Breaking News Cyber Crime BlackSEO click farms Cybercrime mo

Analyzing Xavier: An Information-Stealing Ad Library on Android

by Ecular Xu We have recently discovered a Trojan Android ad library called Xavier (Detected by Trend Micro as ANDROIDOS_XAVIER.AXM) that steals and leaks a user’s information silently. Xavier’s impact has been widespread. Based on data from Trend Micro Mobile App Reputation Service, we detected more than 800 applications embedded the ad library’s SDK that h
Publish At:2017-06-13 14:05 | Read:221 | Comments:0 | Tags:Malware Mobile

Critical kernel command line injection flaw found in Motorola handsets MOTO G4, G5

Security experts have discovered a critical kernel command line injection vulnerability in the Motorola handsets Moto G4 and Moto G5. Security researchers from Aleph Research Motorola have discovered a critical kernel command line injection flaw in the Motorola handset Moto G4 and Moto G5 models. The flaw affects also handsets running the latest Motorola And
Publish At:2017-06-11 18:50 | Read:232 | Comments:0 | Tags:Breaking News Hacking Mobile Kernel command line injection M

June’s Android Security Bulletin Address Critical Vulnerabilities in Media Framework and Qualcomm Components

Google recently released their June security bulletin for Android, which addresses critical vulnerabilities found in Media framework, as well as various critical vulnerabilities that are based on Qualcomm components. As with previous Android security updates, this month’s bulletin is available via over-the-air updates for native Android devices or via servic
Publish At:2017-06-08 23:35 | Read:231 | Comments:0 | Tags:Mobile Vulnerabilities android Qualcomm

IBM Picks Up Six: A Leader in 2017 Gartner Magic Quadrant for Enterprise Mobility Management

For the sixth consecutive year, IBM has been recognized as a Leader in the Gartner Magic Quadrant for Enterprise Mobility Management Suites. In 2017, Gartner continues to define enterprise mobility management (EMM) suites across five core technologies, all of which are available through the following IBM MaaS360 with Watson cognitive unified endpoint managem
Publish At:2017-06-08 16:05 | Read:304 | Comments:0 | Tags:Mobile Security Enterprise Mobility Management (EMM) Gartner

Dvmap: the first Android malware with code injection

In April 2017 we started observing new rooting malware being distributed through the Google Play Store. Unlike other rooting malware, this Trojan not only installs its modules into the system, it also injects malicious code into the system runtime libraries. Kaspersky Lab products detect it as Trojan.AndroidOS.Dvmap.a. The distribution of rooting malware thr
Publish At:2017-06-08 15:45 | Read:317 | Comments:0 | Tags:Featured Mobile code injection Google Android Mobile Malware

Judy Doesn’t Love You – Judy Malware has a sweet name but may have infected 36 million users

Experts found a new malware, dubbed Judy malware, in the Play Store, it is designed to infect Android devices and generate false clicks on advertisements. Google is suffering once again from malicious software applications found inside popular apps available on Play store. The new malware – code named “Judy” – is designed to infect An
Publish At:2017-05-31 17:55 | Read:260 | Comments:0 | Tags:Breaking News Cyber Crime Malware Mobile Android malware Hac

Hackers demonstrated that it is too easy to bypass the Samsung S8 iris scanner.

Hackers demonstrated that it is very easy to bypass the Samsung S8 iris scanner by using a camera, a printer, and a contact lens. Security experts have once against bypassed mobile Biometric system installed on a mobile device, the Samsung S8 model. Hackers used a camera, a printer and a contact lens to bypass the iris scanner installed on the Samsung S8. So
Publish At:2017-05-24 01:50 | Read:331 | Comments:0 | Tags:Breaking News Digital ID Hacking Mobile Security biometric a

Google is rolling out Google Play Protect, a machine-learning system to protect Android users

Google is rolling out a new protection system called Google Play Protect, it is a machine-learning system to protect Android users. Good news for Android users, Google has introduced another security defense system, called Google Play Protect, to protect the devices running its mobile OS. Google already uses several security measures to protect the smartphon
Publish At:2017-05-21 18:30 | Read:282 | Comments:773 | Tags:Breaking News Mobile Security Android Google Play Protect mo

Android Security Bulletin Tackles Additional Critical Mediaserver Issues

Google released their security bulletin for May, which once again tackles Critical vulnerabilities in Android’s Mediaserver component, a prevailing theme for the past few bulletins. Google Pixel and Nexus users can get over-the-air (OTA) updates for their devices, while service providers and manufacturers of Android OEM devices will be responsible for distri
Publish At:2017-05-19 17:35 | Read:307 | Comments:0 | Tags:Mobile Vulnerabilities

PUA Operation Spreads Thousands of Explicit Apps in the Wild and on Legitimate App Stores

One of the most popular ways to make money online is through pornography—whether through legitimate distribution or different online scams. Last year we detected a new variant of the Marcher Trojan targeting users through porn sites, and the year before that popular porn apps were used as lures to compromise millions of mobile users in South Korea. Recently,
Publish At:2017-05-13 14:15 | Read:313 | Comments:0 | Tags:Mobile enterprise certification Potentially Unwanted Applica

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud