Gartner evaluates a number of operating systems and device implementations including Android. Android 9 received strong ratings in 26 of 30 categories, including 12 of the 13 categories in the corp-managed section.
https://www.blog.google/products/android-enterprise/android-enterprise-security-assessed-gartner/
https://www.blog.google/products/android-enterprise/android-enterprise-security-assessed-gartner/
South Africa Has Second Most Android Banking Malware Attacks As Cyber Crime Increases
▪️Android smartphones in South Africa are the second-most targeted for banking malware
▪️There are 13,842 cyber attacks per day in Africa’s most sophisticated economy
https://sabric.co.za/media-and-news/press-releases/digital-banking-crime-statistics/
▪️Android smartphones in South Africa are the second-most targeted for banking malware
▪️There are 13,842 cyber attacks per day in Africa’s most sophisticated economy
https://sabric.co.za/media-and-news/press-releases/digital-banking-crime-statistics/
SABRIC
Digital Banking Crime Statistics
The South African Banking Risk Information Centre (SABRIC) is pleased to be releasing its inaugural digital banking crime statistics.
A popular GPS tracker — used as a panic alarm for elderly patients, to monitor kids, and track vehicles — contains security flaws that could leak real-time locations and can remotely activate its microphone.
▪️Device has integrated SIM card but without internet connectivity
▪️If not properly secured (not by default), it can receive SMS commands from anyone
https://techcrunch.com/2019/05/10/gps-trackers-flaw/
▪️Device has integrated SIM card but without internet connectivity
▪️If not properly secured (not by default), it can receive SMS commands from anyone
https://techcrunch.com/2019/05/10/gps-trackers-flaw/
TechCrunch
Flaws in a popular GPS tracker leak real-time locations and can remotely activate its microphone
A popular GPS tracker — used as a panic alarm for elderly patients, to monitor kids and track vehicles — contains security flaws, which security researchers say are so severe the device should be recalled. The Chinese-manufactured white-label location tracker…
👍1
In Android Q beta 3 apps running in the background can no longer launch activities.
However, users can disable this feature in developer options by turning on "Allow background activity starts."
Because of that, malware could allow it via Accessibility services. https://www.androidpolice.com/2019/05/08/background-apps-can-no-longer-launch-activities-in-android-q-beta-3/
However, users can disable this feature in developer options by turning on "Allow background activity starts."
Because of that, malware could allow it via Accessibility services. https://www.androidpolice.com/2019/05/08/background-apps-can-no-longer-launch-activities-in-android-q-beta-3/
Android Police
Background apps can no longer launch activities in Android Q beta 3
Google is following through on a promise it made when it unveiled Android Q. As of the newly launched beta, apps running in the background can no longer
APKiD (new release) gives you information about how an APK was made.
It identifies many compilers, packers, obfuscators, and other weird stuff. It's PEiD for Android.
https://github.com/rednaga/APKiD/blob/master/README.md
It identifies many compilers, packers, obfuscators, and other weird stuff. It's PEiD for Android.
https://github.com/rednaga/APKiD/blob/master/README.md
GitHub
APKiD/README.md at master · rednaga/APKiD
Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android - rednaga/APKiD
Hacking Public Warning System in LTE Mobile Network
https://t.co/pv7EUmYTa0?amp=1
https://t.co/pv7EUmYTa0?amp=1
3 fake apps found on Google Play Store. Their goal is to steal text messages and set itself as default SMS app. If you have them installed, uninstall them!
Forwarded from The Bug Bounty Hunter
Pentesting Android applications by reversing and finding attack surfaces
https://blog.usejournal.com/an-intro-to-pentesting-an-android-phone-464ec4860f39
https://blog.usejournal.com/an-intro-to-pentesting-an-android-phone-464ec4860f39
Medium
Pentesting Android applications by reversing and finding attack surfaces
In this past semester, I was taking a cybersecurity class. Since our awesome professor believe in the concept that we learn by doing and…
Did You Know These Mobile Fraud Examples?
https://www.linkedin.com/pulse/did-you-know-mobile-fraud-examples-ad-fraud-historian
https://www.linkedin.com/pulse/did-you-know-mobile-fraud-examples-ad-fraud-historian
Linkedin
Did You Know These Mobile Fraud Examples?
Most marketers have heard of mobile ad fraud. Most also assume that fraud detection tech companies are detecting mobile fraud and preventing or reducing it for them.
DEF CON Quals 2019 : VERYANDROIDOSO
#Android #CTF #Writeup #Frida
https://eybisi.run/DEF-CON-Quals-2019-Veryandroidoso/
#Android #CTF #Writeup #Frida
https://eybisi.run/DEF-CON-Quals-2019-Veryandroidoso/
hedgehog's cave
DEF CON Quals 2019 : VERYANDROIDOSO
Here is my writeup for VERYANDROIDOSO task. Ofcourse with frida :D App takes input from us and checks if it is correct flag. Length of flag should be 23 enclosed with OOO{..}. Also inside of brackets
Four Main Mobile Payment Models and their security
https://2muchcoffee.com/blog/paying-with-your-mobile-phone-types-and-models/
https://2muchcoffee.com/blog/paying-with-your-mobile-phone-types-and-models/
Tech News and Discussions | 2muchcoffee
Paying With Your Mobile Phone: Types and Models
Today mobile payment solutions are fast, convenient and secure practice. But what payment type or model to choose? Still confused? Take a look at our approach to classify payment with your mobile phone.
“If you used more than one account on Twitter for iOS and opted into using the precise location feature in one account, we may have accidentally collected location data when you were using any other account(s) on that same device for which you had not turned on the precise location feature,” Twitter said
https://threatpost.com/twitter-leaked-ios-users-location/144687/
https://threatpost.com/twitter-leaked-ios-users-location/144687/
Threat Post
Twitter Leaks Apple iOS Users’ Location Data to Ad Partner
A Twitter glitch "inadvertently" leaked iOS users' location data to an unnamed partner.
Android app "Ever - Capture Your Memories" with 1M+ installs.
What began in 2013 as another cloud storage app has pivoted toward a far more lucrative business known as Ever AI — without telling the app’s millions of users.
https://www.nbcnews.com/tech/security/millions-people-uploaded-photos-ever-app-then-company-used-them-n1003371
What began in 2013 as another cloud storage app has pivoted toward a far more lucrative business known as Ever AI — without telling the app’s millions of users.
https://www.nbcnews.com/tech/security/millions-people-uploaded-photos-ever-app-then-company-used-them-n1003371
NBC News
Millions of people uploaded photos to the Ever app. Then the company used them to develop facial recognition tools.
“The app developers were not clear about their intentions," one Ever user said. "I believe it’s a huge invasion of privacy.”