Android

Summary of Major Mobile Security Threats in 2022

In today’s interconnected world, smartphones have become indispensable tools, playing critical roles in various daily activities, from food delivery to medical appointments. However, the increasing reliance on these devices raises urgent concerns about their security vulnerabilities. Recent findings from Oversecured, a cybersecurity startup, underscore the profound risks associated with mobile…

Read MoreSummary of Major Mobile Security Threats in 2022

APT Hackers Spread Android Trojan Through Syrian e-Government Portal

A sophisticated threat actor has been identified in a recent campaign utilizing Android malware disseminated through the Syrian e-Government Web Portal. This marks a significant evolution in the actor’s toolkit, reflecting an enhanced capability to exploit vulnerabilities for malicious purposes. According to researchers from Trend Micro—Zhengyu Dong, Fyodor Yarochkin, and…

Read MoreAPT Hackers Spread Android Trojan Through Syrian e-Government Portal

New Chinotto Spyware Aims at North Korean Defectors and Human Rights Advocates

Recent Cyber Surveillance Attacks Target North Korean Defectors and Journalists In a disturbing development, advanced persistent threats (APTs) linked to nation-state actors have launched a series of highly-targeted surveillance attacks against North Korean defectors, journalists covering North Korea, and associated organizations based in South Korea. Reports from Russian cybersecurity firm…

Read MoreNew Chinotto Spyware Aims at North Korean Defectors and Human Rights Advocates

Researchers Alert Iranian Users to Rampant SMS Phishing Schemes

A recent phishing campaign has emerged, leveraging socially engineered SMS messages to deliver malware to Android devices. This operation appears to impersonate Iranian governmental and social security entities, aiming to extract credit card information and facilitate financial theft from victims’ bank accounts. In contrast to other forms of banking malware,…

Read MoreResearchers Alert Iranian Users to Rampant SMS Phishing Schemes

Hacking Team DoNot Targets Government and Military Entities in South Asia

A persistent threat actor, suspected to have ties to an Indian cybersecurity firm, has been actively attacking military organizations in South Asia since at least September 2020. The targeted nations include Bangladesh, Nepal, and Sri Lanka, with various iterations of their specialized malware framework used in each assault. According to…

Read MoreHacking Team DoNot Targets Government and Military Entities in South Asia

Hackers Develop New Method to Capture 2-Factor Authentication Codes from Android Devices

Recent reports reveal a concerning new attack method, identified as “Pixnapping,” that exposes vulnerabilities in Android devices, enabling attackers to surreptitiously acquire crucial information such as two-factor authentication codes, location data, and other sensitive details within a mere 30 seconds. The Pixnapping attack originates from a malicious app that must…

Read MoreHackers Develop New Method to Capture 2-Factor Authentication Codes from Android Devices

Hackers Can Access 2FA Codes and Private Messages on Android Devices

New Android Vulnerability Exposes User Data to Attackers Recent research has unveiled a serious vulnerability affecting Android devices, enabling the covert theft of sensitive information, including two-factor authentication codes and user location histories, all within a mere 30 seconds. This attack, termed “Pixnapping,” was developed by a team of academic…

Read MoreHackers Can Access 2FA Codes and Private Messages on Android Devices

Google Addresses 47 Android Security Vulnerabilities, Including Actively Exploited CVE-2024-53104

Google Issues Urgent Security Patches for Android, Targeting Critical Vulnerabilities In a significant security update, Google has deployed patches to rectify 47 vulnerabilities within its Android operating system. Among these vulnerabilities, one has been flagged for active exploitation in real-world scenarios, raising alarms among security professionals and businesses alike. The…

Read MoreGoogle Addresses 47 Android Security Vulnerabilities, Including Actively Exploited CVE-2024-53104

How to Utilize 1Password’s Travel Mode at Border Crossings (2025)

Enhancing Your Digital Security While Traveling As data privacy concerns escalate, business travelers must remain vigilant. One emerging tool in this realm is VeraCrypt, a free and open-source encryption application. This software offers the ability to encrypt entire drives and operating system partitions, similar to services like BitLocker or FileVault.…

Read MoreHow to Utilize 1Password’s Travel Mode at Border Crossings (2025)