You searched for android | Page 2 of 27 | SC Media

Your search for android returned 264 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Vulnerabilities remove

Your search for android returned 264 results

Sort Results:

Relevant Recent
mobile security
Mobile Security, Network Security, Security News, Vulnerabilities

Kernel privilege escalation bug actively exploited in Android devices

Researchers have discovered a zero-day kernel privilege escalation bug that can result in the full compromise of certain Android devices and is apparently being exploited in the wild. Devices known to be affected by the high-level, use-after-free vulnerability include the Pixel 1, 1X:, 2 and 2 XL; the Huawei P20; the Xiaomi Redmi 5A; the…
Banking flaw
Finance, Network Security, Security News, Vulnerabilities

Monzo updates apps after incorrectly storing banking customer PINs

The U.K.-based digital bank Monzo Sunday disclosed that it has fixed an error that caused certain customers’ PIN codes to be stored in a less secure area of its internal systems. In an Aug. 4 company blog post, the mobile-only banking services provider acknowledged that it mistakenly had recorded some customers’ PINs in encrypted log…
Application Security, Security News, Vulnerabilities

Flaw allows attackers to alter media files sent via WhatsApp, Telegram, say researchers

Researchers have reported a vulnerability in the Android versions of WhatsApp and Telegram that could allow malicious actors to manipulate media files sent via the apps. This “media file-jacking” flaw could allow attackers to alter photographs, modify invoices (to aid in a financial scam), swap out files in a particular channel feed, or potentially even…
Mobile Security, Privacy & Compliance News and Analysis, Research, Security News, Vulnerabilities, Wireless Security

Researchers devise method to track Bluetooth devices, despite built-in protections

Researchers from Boston University (BU) have discovered a way to circumvent anonymization protections on Bluetooth Low Energy devices, allowing potentially malicious actors to passively track the movements of these devices and their users. BLE devices rely on non-encrypted advertising messages to signal their availability to other devices to pair up. To prevent third-party actors from…
trojanhorse_1032765
Mobile Security, Security News

Google reveals actors behind Triada trojan

An analysis by Google Security on the Triada malware family found a vendor going by the name of either Yehuo or Blazefire was most likely responsible for malware that came preinstalled on some Android phones. Google’s research revealed Triada was most likely implanted on a device during the manufacturing process when the vendor opted to…
Mobile Security, Security News

WhatsApp patches flaw allowing easy installation of Pegasus spyware

Facebook posted a security advisory for a buffer overflow vulnerability in its subsidiary WhatsApp that could allow an attacker to install Pegasus spyware on victims devices. The  Israeli NSO group developed spyware allows its users to turn on a phone’s camera and mic, scan emails and messages, and collect the user’s location data and can…
IoT, Network Security, Vulnerabilities

Flawed P2P technology threatens millions of IoT devices

At least two million internet-connected devices featuring the peer-to-peer (P2P) communications technology iLnkP2P contain two major security flaws that could allow malicious actors to discover the products online, snoop on them and hijack them. Security researcher Paul Marrapese discovered the issue in hundreds of brands of security cameras, baby monitors, smart doorbells and digital video…
Mobile Security, Security News, Vulnerabilities

Security update removes hard-coded credentials from MyCar Controls app

Motor vehicle technology and equipment provider AutoMobility Distribution Inc. has updated its MyCar Controls telematics mobile application for iOS and Android in order to eliminate the use of insecure hard-coded credentials. The MyCar app offers geolocation services as well as remote start/stop and lock/unlock capabilities to vehicles that come with a compatible remote start unit.…
Security News, Vulnerabilities

Xiaomi devices came with vulnerability baked into its pre installed security app

A preinstalled mobile security app on Xiaomi left user devices more vulnerable than protected, researchers said. Check Point researchers discovered a vulnerability in Xiaomi phones’ “Guard Provider app” that could expose users to attacks caused by the unsecured nature of network traffic to and from the app and the use of multiple SDKs within the…
Network Security, Security News, Vulnerabilities

Flaws in visitor management systems could roll out welcome mat for attackers

Five kiosk-based visitor management systems designed to securely check guests into business facilities or industrial buildings were found to contain vulnerabilities that could potentially allow attackers to physically intrude into spaces, break into private networks or steal information. Normally, these systems automate the authentication of visitors and provision them with security badges (potentially RFID-enabled) for…
Next post in Network Security