Mobile ad networks can provide a loophole to serve malware to Android devices, according to researchers from security firm Palo Alto Networks who have found new Android threats being distributed in this manner.
Google has announced a new Android Device Manager service and app designed to plug physical security holes. It will be available later in August.
A feature that allows Android users to authenticate themselves on Google websites without having to enter their account password can be abused by rogue apps to give attackers access to Google accounts, a security researcher has revealed.
Businesses more interested in controlling which apps are installed on the phones, and separating corporate data from users' personal data
An increasing number of Android phones are infected with mobile malware programs that are able to turn the handsets into spying devices, according to a report from Kindsight Security Labs, a subsidiary of telecommunications equipment vendor Alcatel-L...
Google quickly addressed a mega flaw in its Android mobile operating system after security researchers brought it to the company's attention earlier this month, but those fixes appear to be slow in reaching handset owners.
A second vulnerability that can be exploited to modify legitimate Android apps without breaking their digital signatures has been identified and publicly documented.
Peter Sunde, the co-founder of BitTorrent search engine The Pirate Bay, is working on developing a secure mobile messaging app and service that's intended to be safe from government surveillance and be user friendly at the same time.
Technical details and a proof-of-concept exploit have been published for a recently announced Android vulnerability that potentially affects millions of devices and allows attackers to turn legitimate apps into Trojan programs.
China saw an increase in Trojan and botnet attacks coming from other countries in 2012, as the amount of mobile malware in the country also surged, according to a local security group.
A vulnerability that has existed in Android for the past four years can allow hackers to modify any legitimate and digitally signed application in order to transform it into a Trojan program that can be used to steal data or take control of the OS.
ZRTPCPP, an open-source library that's used by several applications offering end-to-end encrypted phone calls, contained three vulnerabilities that could have enabled arbitrary code execution and denial-of-service attacks, according to researchers fr...
Over three quarters of Android threats are malicious apps that send SMS messages to premium rate numbers and could be mitigated by a protection feature present in Android 4.2, according to researchers from networking vendor Juniper Networks.
Google is revealing some new numbers around malware and phishing attempts in an effort to get more people thinking about online security and to make the Web safer.
Edward Snowden, the former NSA contractor who leaked information about U.S. government mass surveillance programs, has been charged by the U.S. with espionage, the Washington Post reported Friday.
Most Popular Reviews
- 1 Lenovo ThinkPad X1 Carbon Ultrabook (2015 model)
- 2 Synology DiskStation DS215j NAS device
- 3 Fitbit Charge wireless activity tracker
- 4 HP Stream 11 laptop
- 5 B&O BeoPlay A2 portable Bluetooth speaker
Best Deals on GoodGearGuide
Latest News Articles
- Google Now adds data from Lyft, Airbnb and many more apps
- Outlook app for Android and iOS boosts Microsoft's mobile comeback
- MIT randomizes tasks to speed massive multicore processors
- NEC aims at Big Data 'sweet spot' with new SAP Hana tool
- Uber will fight to keep its Boston ride data private
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.