If you thought that there was no way the government could spy on your phone, the authorities in Serbia have some magic beans ...
A team of academic researchers has uncovered a new Android security exploit that raises a lot of questions about the platform’s permission system. The technique, named TapTrap, uses user interface ...
Pixnapping could be used to steal private data, including 2FA codes. Side-channel attack abuses Google Android APIs to steal data on display. Flaw is partially patched, although a more complete fix is ...
Researchers have developed Metaphor, a “fast, reliable, and stealthy” exploit for the Stagefright vulnerability that can affect millions of Android devices. Whether or not the attack becomes widely ...
A proof-of-concept (PoC) exploit for a local privilege elevation flaw impacting at least seven Android original equipment manufacturers (OEMs) is now publicly available on GitHub. However, as the ...
Google LLC’s Threat Analysis Group today shared details on multiple observed in-the-wild exploit campaigns that used watering-hole attacks on Mongolian government websites between November 2023 and ...
Bas Bosschert, a self-billed “consultant/sysadmin/entrepreneur,” has demonstrated a proof-of-concept exploit that shows how the locally stored message database ...
According to the report, Cellebrite, an Israeli-based digital forensics company, exploited the flaw as part of an Android zero-day attack. The exploit targets Android USB drivers, making billions of ...