Mobile security is one of the essential things you have to keep in mind when getting a new Android phone or tablet, or even when you have older gadgets with you. Adding layers and layers of security won’t hurt; it may instead greatly benefit you. Among the number of antivirus and mobile security apps you can find in the Google Play Store, one will definitely impress you with its extensive usability. That app is Antivirus & Mobile Security by TrustGo Mobile Incorporated.
Antivirus & Mobile Security protects your Android device from any harmful malware and viruses and lets you be aware of apps that have suspicious permissions that may jeopardize your [...]
There is a new generation of Android malware, and authors are increasingly becoming sophisticated with their social engineering capabilities. According to security companies, there is a trend among malware makers that involves using hacked versions of real apps to deliver a malicious payload.
There are about 20,000 malicious Android apps in circulation, says Trend Micro. And about 13 million phones worldwide have been infected, says Chinese security firm NetQin. A big part of these involve remotely controlling smartphones into sending premium text messages, as well as spamming the phones’ inboxes with junk messages.Real apps with real payloads
With several cases of malware-ridden apps surfacing on Google Play, Google is updating its developer program policies to make the digital playground a somewhat safer place to hangout. In its own words, it is shaming “unhealthy behavior” shown by irresponsible developers that use deceptive app names and spammy notifications, among others.
Google is now restricting the use of names or icons that appear similar to existing system apps or existing products. This should help ensure that users won’t be duped into downloading a fake app like the imaginary Infinity Blade 2.
The list of “dangerous products” that won’t be allowed on Google Play is now laid out in greater [...]
As the global adoption of smartphones has reached impressive levels during the past couple of years or so (with absolutely no sign of stopping anytime soon), it is surely not surprising to see that hackers have turned their evil eye towards exploiting the various weaknesses of your favorite mobile device. But although in the past we’ve talked how hackers exploit various soft spots in the OS, it turns out that attackers can actually use underlying technologies to get access to private information.
According to Ralf-Philipp Weimann, a researcher at the University of Luxembourg, Assisted GPS (A-GPS) is one of the technologies that hides such vulnerabilities. Just so that [...]
Another blemish on the reputation of the Google Play Store – a fake Infinity Blade 2 app went live on the Play store on July 28, and accrued more than 1000 downloads before being taken down.
The fake application, a 2.2 MB APK, prompted users to earn 50 points on Tapjoy (paid ad clicks) in order to unlock the full game download. Some users reported that the download never became available, while others said that the 1.03GB file was just “junk”.
The app was published by “2011 Chair Entertainment Group LLC” (the developer of the real iOS game is Chair Entertainment Group, LLC) and used the official branding and copy of the iOS game. It is unclear what the purpose [...]
A new Android application, developed with funding from DARPA, aims to show users precisely what security holes there are on their Android devices.
Called X-Ray, the app was created by Duo Security, and is now available for download at XRay.io as a standalone APK. What X-Ray does is analyze your Android system and look for known vulnerabilities, including privilege escalation bugs. According to X-Ray,
“Such vulnerabilities can be exploited by a malicious application to gain root privileges on a device and perform actions that would normally be restricted by the Android operating system. A number of such vulnerabilities have been discovered in the core Android [...]
A new piece of malware, dubbed FireLeaker, has been found by NQ Mobile’s Security Research Center. Unlike other types of malware, which send premium rate SMS message or install a keylogger to try and steal password and banking information, FireLeaker wants your contacts and system information.
What FireLeaker does is collect your contacts and then uploads them to a remote server. The precise reason for this data stealing isn’t yet known, but most likely the information will either be sold on to e-mail spammers, who will bombard people in your address book with all kinds of unsavory and strange offers; or it will [...]