Quantcast
Channel: IT Info Magazine » Android
Browsing all 20 articles
Browse latest View live

Android or PC botnet!

Google denies the claims made by Microsoft’s security researcher on a spamming Android botnet which compromises Yahoo accounts on these devices. A post by Terry Zink on MSDN blogs outlines how Android...

View Article



Network Traffic Analysis of Android Mobile Apps

Securing mobile devices within the organization has become a hot topic and many articles have been written about the new trend of Bring Your Own Device (BYOD). It is always recommended to follow...

View Article

Scan your Android for Vulnerabilities

If you have never run some sort of security check on your Android device then, you are at risk! Although, the main threat is malicious apps running on your Android device, other critical components...

View Article

How can you protect your Android device?

The threat landscape for Android devices has reached alarming levels and we are now dealing with the same type of scenario that threatened Microsoft Windows systems for so many years. Major security...

View Article

8 Security Tips for Android Devices

The following 8 tips will help you benchmark your security awareness about Android devices. You may take the necessary measures to secure your personal computer but you may not follow suit when it...

View Article


Code Signing Technology for Mobile Apps

As the proliferation of mobile applications has attracted the attention of cyber criminals, more and more mobile devices are exposed to an even greater risk of becoming infected with malware. The...

View Article

A new distro for Mobile Forensics

A new community-based Linux distribution designed for helping professionals in mobile forensics, mobile malware, and mobile security testing is currently in its alpha release. The project called...

View Article

Top 10 dangerous permissions most requested by Android malware

Malware on Android phones is getting more and more sophisticated and one good practice that any user needs to become aware of is about apps access rights. In other words, which access permissions an...

View Article


Google Play services and OAuth 2.0

Google will make OAuth 2.0 authorization available to Android apps as to allow apps leverage the built-in security features of the OAuth 2.0 protocol. OAuth 2.0 protocol can help in mitigating attacks...

View Article


Mobile Security Reviews

Mobile phones represent a security risk that not so many users seem to comprehend as is the case with personal computers and laptops. Owners of personal computers use and run security software on their...

View Article

What to expect in 2013

According to Sophos CTO Gerhard Eschelbeck, modern malware has become extremely effective at attacking new platforms and that explains why we are experiencing a rapid growth of malware attacking mobile...

View Article

Safer to use mobile banking apps!

Due to the higher traffic generated by PC-based banking and the availability of theft tools, personal computers are still considered as more vulnerable to bank fraud than mobile devices! Although, we...

View Article

Android Malware Families

If you happen to read a lot about the increasing trend of malware on Android devices, you may think that all this hype is another marketing gimmick orchestrated by some interested parties. We tend to...

View Article


Ubuntu phones expected to ship later this year

Competitively priced, the new mobile OS (Ubuntu) is expected to ship to end consumers in late 2013. Although, the new Ubuntu mobile version is built around Google’s Android OS, it will feature a full...

View Article

Mobile Security Project

The OWASP (Open Web Application Security Project) Mobile Security Project is a centralized resource intended to give developers and security teams the resources they need to build and maintain secure...

View Article


More Android malware on legitimate websites

The trend of compromised legitimate websites hosting malware continues as more and more infections are detected and reported by security experts utilizing monitoring tools. Webroot.com has reported...

View Article

Free Secure Mobile Apps for Personal Security, Anonymity and Privacy

The open-source Guardian Project is aimed towards the creation of Android mobile apps that can be used by Android users (both technical and non-technical) to protect their communications and personal...

View Article


Symantec’s latest Internet Security Threat Report

With its Global Intelligence Network made of approximately 69 million attack sensors, Symantec is able to collect thousands of events per second. This network monitors threat activity in over 157...

View Article

Stay Private on your Android phone

In a way or another state surveillance programs will never cease to exist and the best to way guarantee your privacy online is to deploy tools that help you achieve anonymity as much as possible. For...

View Article

Free android application analysis tool

The free tool Dexter from Bluebox labs assists security researchers in their malware analyzes on the Android platform. Its UI allows for graph views that help you getting a better overview of relations...

View Article
Browsing all 20 articles
Browse latest View live




Latest Images