A new Android exploit has security experts paying attention. Here's what you should know as researchers work to better ...
Pixnapping could be used to steal private data, including 2FA codes. Side-channel attack abuses Google Android APIs to steal data on display. Flaw is partially patched, although a more complete fix is ...
Google kicked off Dangerous December with a warning that Android is under attack, with two critical vulnerabilities “under ...
A team of academic researchers has uncovered a new Android security exploit that raises a lot of questions about the platform’s permission system. The technique, named TapTrap, uses user interface ...
Researchers have developed Metaphor, a “fast, reliable, and stealthy” exploit for the Stagefright vulnerability that can affect millions of Android devices. Whether or not the attack becomes widely ...
A proof-of-concept (PoC) exploit for a local privilege elevation flaw impacting at least seven Android original equipment manufacturers (OEMs) is now publicly available on GitHub. However, as the ...
Bas Bosschert, a self-billed “consultant/sysadmin/entrepreneur,” has demonstrated a proof-of-concept exploit that shows how the locally stored message database ...
According to the report, Cellebrite, an Israeli-based digital forensics company, exploited the flaw as part of an Android zero-day attack. The exploit targets Android USB drivers, making billions of ...