You searched for android | SC Media

Your search for android returned 127 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Robert Abel remove

Your search for android returned 127 results

Sort Results:

Relevant Recent
mobile security
Mobile Security, Security News

Google Keystore feature looks to improve Android Pie security

Google is boosting Android Key security for mobile apps with new Keystore features to improve the safety of devices running Android Pie. The Android Keystore provides application developers with cryptographic tools designed to secure user data and Android Pie is introducing new capabilities to Keystore to enable restrictions on key use and to secure key…
Cybercrime, Security News

Unofficial Telegram app secretly loads malicious sites

An unofficial Telegram app is secretly loading malicious sites onto the devices of unsuspecting users and running other malicious services in the background without the users’ consent. Symantec researchers discovered the malicious app, named MobonoGram 2019 (detected as Android.Fakeyouwon) and advertised as an unofficial version of the Telegram messaging application with more features than the…
Security News, Vulnerabilities

Hide and seek Iot botnet updates include new Android ADB exploit

The Hide and Seek botnet has been updated to deliver new command injection exploits in a device’s web interface. The variants exploit the Android Debug Bridge (ADB) over Wi-Fi feature in Android devices, a features that is normally used for trouble shooting, according to a Sept. 26 Bitdefender blog post. Despite the feature usually being…
mobile security
Security News, Vulnerabilities

Android vulnerability exposes users data via Wifi

Nightwatch Cybersecurity Researchers identified a sensitive data exposure via Wifi Broadcast vulnerability in Android OS. Researchers discovered system broadcasts by Android devices expose information about the user’s device to all applications running on the device that can be intercepted and bypass any permission checks and existing mitigations on the vulnerable device, according to an Aug.…
Next post in Security News