Android or PC botnet!
Google denies the claims made by Microsoft’s security researcher on a spamming Android botnet which compromises Yahoo accounts on these devices. A post by Terry Zink on MSDN blogs outlines how Android...
View ArticleNetwork Traffic Analysis of Android Mobile Apps
Securing mobile devices within the organization has become a hot topic and many articles have been written about the new trend of Bring Your Own Device (BYOD). It is always recommended to follow...
View ArticleScan your Android for Vulnerabilities
If you have never run some sort of security check on your Android device then, you are at risk! Although, the main threat is malicious apps running on your Android device, other critical components...
View ArticleHow can you protect your Android device?
The threat landscape for Android devices has reached alarming levels and we are now dealing with the same type of scenario that threatened Microsoft Windows systems for so many years. Major security...
View Article8 Security Tips for Android Devices
The following 8 tips will help you benchmark your security awareness about Android devices. You may take the necessary measures to secure your personal computer but you may not follow suit when it...
View ArticleCode Signing Technology for Mobile Apps
As the proliferation of mobile applications has attracted the attention of cyber criminals, more and more mobile devices are exposed to an even greater risk of becoming infected with malware. The...
View ArticleA new distro for Mobile Forensics
A new community-based Linux distribution designed for helping professionals in mobile forensics, mobile malware, and mobile security testing is currently in its alpha release. The project called...
View ArticleTop 10 dangerous permissions most requested by Android malware
Malware on Android phones is getting more and more sophisticated and one good practice that any user needs to become aware of is about apps access rights. In other words, which access permissions an...
View ArticleGoogle Play services and OAuth 2.0
Google will make OAuth 2.0 authorization available to Android apps as to allow apps leverage the built-in security features of the OAuth 2.0 protocol. OAuth 2.0 protocol can help in mitigating attacks...
View ArticleMobile Security Reviews
Mobile phones represent a security risk that not so many users seem to comprehend as is the case with personal computers and laptops. Owners of personal computers use and run security software on their...
View ArticleWhat to expect in 2013
According to Sophos CTO Gerhard Eschelbeck, modern malware has become extremely effective at attacking new platforms and that explains why we are experiencing a rapid growth of malware attacking mobile...
View ArticleSafer to use mobile banking apps!
Due to the higher traffic generated by PC-based banking and the availability of theft tools, personal computers are still considered as more vulnerable to bank fraud than mobile devices! Although, we...
View ArticleAndroid Malware Families
If you happen to read a lot about the increasing trend of malware on Android devices, you may think that all this hype is another marketing gimmick orchestrated by some interested parties. We tend to...
View ArticleUbuntu phones expected to ship later this year
Competitively priced, the new mobile OS (Ubuntu) is expected to ship to end consumers in late 2013. Although, the new Ubuntu mobile version is built around Google’s Android OS, it will feature a full...
View ArticleMobile Security Project
The OWASP (Open Web Application Security Project) Mobile Security Project is a centralized resource intended to give developers and security teams the resources they need to build and maintain secure...
View ArticleMore Android malware on legitimate websites
The trend of compromised legitimate websites hosting malware continues as more and more infections are detected and reported by security experts utilizing monitoring tools. Webroot.com has reported...
View ArticleFree Secure Mobile Apps for Personal Security, Anonymity and Privacy
The open-source Guardian Project is aimed towards the creation of Android mobile apps that can be used by Android users (both technical and non-technical) to protect their communications and personal...
View ArticleSymantec’s latest Internet Security Threat Report
With its Global Intelligence Network made of approximately 69 million attack sensors, Symantec is able to collect thousands of events per second. This network monitors threat activity in over 157...
View ArticleStay Private on your Android phone
In a way or another state surveillance programs will never cease to exist and the best to way guarantee your privacy online is to deploy tools that help you achieve anonymity as much as possible. For...
View ArticleFree android application analysis tool
The free tool Dexter from Bluebox labs assists security researchers in their malware analyzes on the Android platform. Its UI allows for graph views that help you getting a better overview of relations...
View Article
More Pages to Explore .....