A team of academic researchers has uncovered a new Android security exploit that raises a lot of questions about the platform’s permission system. The technique, named TapTrap, uses user interface ...
Pixnapping could be used to steal private data, including 2FA codes. Side-channel attack abuses Google Android APIs to steal data on display. Flaw is partially patched, although a more complete fix is ...
Android apps really do use those permissions they ask for to access users’ personal information: one online store records a phone’s location up to 10 times a minute, French researchers have found. The ...
Bas Bosschert, a self-billed “consultant/sysadmin/entrepreneur,” has demonstrated a proof-of-concept exploit that shows how the locally stored message database ...
Researchers have developed Metaphor, a “fast, reliable, and stealthy” exploit for the Stagefright vulnerability that can affect millions of Android devices. Whether or not the attack becomes widely ...
There's another security scare on Android, but you can keep yourself safe with a little common sense. Even if you can't, it's not as bad as it sounds. Share on Facebook (opens in a new window) Share ...
Discover how AI and automation strengthen defenses, streamline operations, and deliver measurable business impact. Hear from ...
On March 26, Symantec discovered 11 Android applications that were all made to appear like they were legitimate apps related to tracking cases in the Covid-19 pandemic, but which were in fact secretly ...
Jay primarily writes news and deals posts for Android Police. Before joining AP, he spent the past several years yammering on about the crazy world of Android for various tech outlets. Besides ...
This week, ESET researchers documented their discovery of a zero-day exploit that appeared for sale on underground forums and targets the Telegram app for Android. The underlying vulnerability, which ...