Posted by A Ocean on April 22, 2013 ·
A Malware family called Badnews has been discovered by Lookout Security in Google Play developer accounts, Badnews avoided detection and made its way onto the Google Play store has been downloaded between 2-9 million times according to Lookout .
Google was notified of the outbreak and all affected apps have been removed from the Android store. Lookout found 32 applications that contained code from [...]
Posted by A Ocean on March 7, 2013 ·
Android’s share of mobile malware has increased by almost double in the last quarter, and now pegs in at 96 percent of the mobile malware market, according to a recent report by F-Secure
Android users may be wondering If android is vulnerable to attack due to it been the the most popular smartphone OS currently, or is it because it’s just fundamentally easier to attack. Whatever the reason, [...]
Posted by A Ocean on August 11, 2010 ·
Android
A Trojan horse began appearing on phones running Google’s Android software in Russia. The malware was detected by security firm Kaspersky, who reported the file is named “Trojan-SMS.AndroidOS.FakePlayer.a” and is downloaded as a .APK Android app. This is the first known Android specific trojan.
Once the file is installed the Trojan horse begins sending text messages to premium-rate [...]
Posted by Ruk Cooray on January 18, 2010 ·
Image via Wikipedia
With Operation Aurora, professional hackers have taken the hack attacks to ‘never seen before’ ultra sophisticated levels. It’s phenomenal that an attacker can take on not one, not two but nearly a dozen of highly acclaimed companies including the likes of Google and Adobe.
Operation Aurora is probably the smartest combination of stealth programming, strong encryption [...]
Posted by Vlad Ionesi on July 31, 2009 ·
Danger! Your Apple iPhone can be targeted by hackers! They can break into your iPhone and deliver malware, intercept messages, or track your keystrokes. This is achieved by launching a Denial of Service (DoS) attack through the SMS protocol. Through this DoS attack, the hacker can take control of any iPhone. Why? To steal sensitive information, send spam and malware, or just keep you off the network.
“Its [...]