VoLTE: Voice over LTE is a high-speed wireless communication standard for mobile phones. It has up to three…
The post How Unlimited Internet Data Has Changed The Face Of Cybercrime? appeared first on Quick Heal Blog | Latest computer security news, t…
VoLTE: Voice over LTE is a high-speed wireless communication standard for mobile phones. It has up to three…
Google introduces Private Compute Services, a collection of services aimed at designing to improve privacy in the Android operating system. Good news for Android users, Google has implemented the Private Compute Services, a set of features aimed at improving their privacy. “We introduced Android’s Private Compute Core in Android 12 Beta. Today, we’re excited to announce a […]
The post Google implements new Private Compute Services for Android appeared first on Security Affairs.Read More Google implements new Private Compute Services for Android
SOVA is a new Android banking trojan that targets banking applications, cryptocurrency wallets, and shopping apps from the U.S. and Spain. Researchers from cybersecurity firm ThreatFabric have spotted in the beginning of August a new Android banking trojan, dubbed SOVA, that targets banking applications, cryptocurrency wallets, and shopping apps from the U.S. and Spain. The […]
The post New SOVA Android Banking trojan is rapidly growing appeared first on Security Affairs.Read More New SOVA Android Banking trojan is rapidly growing
Posted by Suzanne Frey, VP, Product, Android & Play Security and PrivacyWe introduced Android’s Private Compute Core in Android 12 Beta. Today, we’re excited to announce a new suite of services that provide a privacy-preserving bridge between Private C…Read More Introducing Android’s Private Compute Services
Warzone RAT is part of an APT campaign named “Confucius.” Confucius APT is known to target government sectors…
The post WARZONE RAT – Beware Of The Trojan Malware Stealing Data Triggering From Various Office Documents appeared first on Quick Heal Blo…
For the last three years, Joker Trojan is making its way on Google Play Store. Quick Heal Security…
The post Google Play store applications laced with Joker malware yet again appeared first on Quick Heal Blog | Latest computer security news, tips, an…
Posted by Joel Galenson and Matthew Maurer, Android Team One of the main challenges of evaluating Rust for use within the Android platform was ensuring we could provide sufficient interoperability with our existing codebase. If Rust is to meet its goal…Read More Rust/C++ interop in the Android Platform
Posted by Jon Markoff and Sean Smith, Android Security and Privacy Team Integrating security into your app development lifecycle can save a lot of time, money, and risk. That’s why we’ve launched Security by Design on Google Play Academy to help develo…Read More Introducing Security By Design
All that glisters is not gold/Often have you heard that told/Gilded tombs do worms enfoldRead More Beware fake online trading apps, on iOS as well as Android
Malware researchers from Cleafy warn of a new Android banking trojan dubbed TeaBot (aka Anatsa) that is targeting banks in Europe. Malware experts from the Italian cybersecurity firm Cleafy have spotted a new Android banking trojan dubbed TeaBot (aka Anatsa) that is targeting banks in Spain, Germany, Italy, Belgium, and the Netherlands. TeaBot malware appeared […]
The post TeaBot Android banking Trojan targets banks in Europe appeared first on Security Affairs.Read More TeaBot Android banking Trojan targets banks in Europe
Posted by Ivan Lozano, Android TeamThe Android team has been working on introducing the Rust programming language into the Android Open Source Project (AOSP) since 2019 as a memory-safe alternative for platform native code development. As with any larg…Read More Integrating Rust Into the Android Open Source Project
BIO-key International introduced its new mobile app, BIO-key MobileAuth with PalmPositive the latest among over sixteen strong authentication factors available for BIO-key’s PortalGuard Identity-as-a-Service (IDaaS) platform. MobileAuth’s fast, t…Read More BIO-key releases MobileAuth, a touchless biometric authentication app
A computer science engineer at Michigan State University has a word of advice for the millions of bitcoin owners who use smartphone apps to manage their cryptocurrency: don’t. Or at least, be careful. Researchers are developing a mobile app to ac…Read More Bitcoin Security Rectifier app aims to make Bitcoin more secure
Sentry announced new and enhanced platform capabilities designed to improve developer workflows and productivity by making it easier to find and resolve the issues that really matter, faster. Developers are under pressure to write more code than ever t…Read More Sentry enhances platform capabilities to improve developer workflows and productivity
Ivanti Wavelink announced that Ivanti Speakeasy, Ivanti Velocity Web Browser and Velocity Telnet (TE) are now available on SAP Store. These solutions are integrated with SAP Extended Warehouse Management (SAP EWM), with a second integration available f…Read More Three Ivanti Wavelink applications now available on SAP Store
Following in the footsteps of Apple, Google LLC recently announced its intention to execute a new Google Play policy that will allow users to see what personal information is being collected by app developers and what for. The announcement comes six mo…Read More Google Will Require Android App Developers to Disclose Data Collection Procedures
Latest episode – listen now! (And please share with your friends.)Read More S3 Ep31: Apple zero-days, Flubot scammers and PHP supply chain bug [Podcast]
This browser update is for everyone, but it’s for Android users particularly.Read More Firefox for Android gets critical update to block cookie-stealing hole
Avatier announced the release of Avatier for Outlook, giving users passwordless Single Sign-On (SSO) and unified Identity Access Management (IAM) from within Outlook to make remote work more secure. Avatier for Outlook improves workforce efficiency by …Read More Avatier for Outlook offers passwordless Single Sign-On and IAM to improve workforce efficiency
Here’s the latest Naked Security talk – watch now!Read More Naked Security Live – Beware ‘Flubot’: the home delivery scam with a difference
Posted by Jeff Vander Stoep and Stephen Hines, Android Team Correctness of code in the Android platform is a top priority for the security, stability, and quality of each Android release. Memory safety bugs in C and C++ continue to be the most-difficu…Read More Rust in the Android platform
VPN is a prominent tool for enhanced online life. VPN consists of a tunnel that your encrypted data…
The post Data of 21 Million VPN users breached appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.
For public health officials, contact tracing remains critical to managing the spread of the coronavirus — particularly as it appears that variants of the virus could be more transmissible. The need for widespread contact tracing at the start of t…Read More Researchers propose more secure and private mobile contact tracing
The extended support includes more than 130 devices.
The post Samsung devices to receive four years of security updates, one more than Pixel phones first appeared on IT World Canada.
We’ve all come to a realization that we don’t go anywhere without our phone. It’s a utility that helps us navigate our daily lives: directions, schedules, shopping, discounts, banking, and so on. And as our reliance on our smartphone continues to grow, it’s no wonder that hackers have taken notice. This time, it’s another case […]
The post Millions Affected by Malware Attributed to Android Barcode-Scanning App appeared first on McAfee Blogs.Read More Millions Affected by Malware Attributed to Android Barcode-Scanning App
Interesting story about a barcode scanner app that has been pushing malware on to Android phones. The app is called Barcode Scanner. It’s been around since 2017 and is owned by the Ukrainian company Lavabird Ldt. But a December 2020 update included some new features:
However, a rash of malicious activity was recently traced back to the app. Users began noticing something weird going on with their phones: their default browsers kept getting hijacked and redirected to random advertisements, seemingly out of nowhere.
Generally, when this sort of thing happens it’s because the app was recently sold. That’s not the case here…Read More Malicious Barcode Scanner App
Multiple vulnerabilities in the popular file-sharing app SHAREit have yet, to be addressed, experts from Trend Micro warned. SHAREit is a popular file-sharing Android app with more than one billion downloads, experts from Trend Micro discovered multiple unpatched vulnerabilities in its code. The vulnerabilities impact the Android version of SHAREit, a mobile app that allows users […]
The post Popular SHAREit app is affected by severe flaws yet to be fixed appeared first on Security Affairs.Read More Popular SHAREit app is affected by severe flaws yet to be fixed
Qualys announced it is expanding Qualys VMDR (Vulnerability Management, Detection and Response) to mobile devices with support for Android and iOS/iPadOS delivering an end-to-end solution for mobile device security. Qualys’ all-in-one VMDR provid…Read More Qualys expands VMDR to mobile devices with support for Android and iOS/iPadOS
Lookout researchers provided details about two Android spyware families employed by an APT group tracked as Confucius. Researchers at mobile security firm Lookout have provided details about two recently discovered Android spyware families, dubbed Hornbill and SunBird, used by an APT group named Confucius. Confucius is a pro-India APT group that has been active since […]
The post Experts spotted two Android spyware used by Indian APT Confucius appeared first on Security Affairs.Read More Experts spotted two Android spyware used by Indian APT Confucius
It seems to be the season of sophisticated supply-chain attacks.
This one is in the NoxPlayer Android emulator:
Read More NoxPlayer Android Emulator Supply-Chain Attack
ESET says that based on evidence its researchers gathered, a threat actor compromised one of the company’s official API (api.bignox.com) and file-hosting servers (res06.bignox.com).
Using this access, hackers tampered with the download URL of NoxPlayer updates in the API server to deliver malware to NoxPlayer users.
Despite evidence implying that attackers had access to BigNox servers since at least September 2020, ESET said the threat actor didn’t target all of the company’s users but instead focused on specific machines, suggesting this was a highly-targeted attack looking to infect only a certain class of users…
Posted by Kevin Deus, Joel Galenson, Billy Lau and Ivan Lozano, Android Security & Privacy TeamThe Android platform team is committed to securing Android for every user across every device. In addition to monthly security updates to patch vulnerabi…Read More Data Driven Security Hardening in Android
We recently came across 2 malicious Joker family malware applications on Google Play Store — the company was…
The post Stay Alert, Joker still making its way on Google Play Store! appeared first on Quick Heal Blog | Latest computer security news, ti…
2020 will be remembered for a lot of sweeping changes and online classes are definitely on top of…
The post Don’t let your kids’ online classes be disrupted by cyberattacks! appeared first on Quick Heal Blog | Latest computer security news, tips, and…
A software engineer wanted to sell his washing machine. He placed an advertisement on an e-commerce website and…
The post Protect yourself from Fraudulent QR codes appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.
Posted by Yang Lu, Software Engineer, Angana Ghosh, Group Product Manager, and Xu Liu, Director of Engineering, Gboard team Google Keyboard (a.k.a Gboard) has a critical mission to provide frictionless input on Android to empower users to communicate a…Read More Privacy-Preserving Smart Input with Gboard
Posted by Kylie McRoberts, Program Manager and Alec Guertin, Security Engineer
Google’s Android Security & Privacy team has launched the Android Partner Vulnerability Initiative (APVI) to manage security issues specific to Android OEMs. The APVI is designed to drive remediation and provide transparency to users about issues we have discovered at Google that affect device models shipped by Android partners.
Another layer of security
Android incorporates industry-leading security features and every day we work with developers and device implementers to keep the Android platform and ecosystem safe. As part of that effort, we have a range of existing programs to enable security researchers to report security issues they have found. For example, you can report vulnerabilities in Android code via the Android Security Rewards Program (ASR), and vulnerabilities in popular third-party Android apps through the Google Play Security Rewards Program. Google releases ASR reports in Android Open Source Project (AOSP) based code through the Android Security Bulletins (ASB). These reports are issues that could impact all Android based devices. All Android partners must adopt ASB changes in order to declare the current month’s Android security patch level (SPL). But until recently, we didn’t have a clear way to process Google-discovered security issues outside of AOSP code that are unique to a much smaller set of specific Android OEMs. The APVI aims to close this gap, adding another layer of security for this targeted set of Android OEMs.
Improving Android OEM device security
The APVI covers Google-discovered issues that could potentially affect the security posture of an Android device or its user and is aligned to ISO/IEC 29147:2018 Information technology — Security techniques — Vulnerability disclosure recommendations. The initiative covers a wide range of issues impacting device code that is not serviced or maintained by Google (these are handled by the Android Security Bulletins).
Protecting Android users
The APVI has already processed a number of security issues, improving user protection against permissions bypasses, execution of code in the kernel, credential leaks and generation of unencrypted backups. Below are a few examples of what we’ve found, the impact and OEM remediation efforts.
In some versions of a third-party pre-installed over-the-air (OTA) update solution, a custom system service in the Android framework exposed privileged APIs directly to the OTA app. The service ran as the system user and did not require any permissions to access, instead checking for knowledge of a hardcoded password. The operations available varied across versions, but always allowed access to sensitive APIs, such as silently installing/uninstalling APKs, enabling/disabling apps and granting app permissions. This service appeared in the code base for many device builds across many OEMs, however it wasn’t always registered or exposed to apps. We’ve worked with impacted OEMs to make them aware of this security issue and provided guidance on how to remove or disable the affected code.
checkUidPermission method in the
PackageManagerService class was modified in the framework code for some devices to allow special permissions access to some apps. In one version, the method granted apps with the shared user ID
com.google.uid.shared any permission they requested and apps signed with the same key as the
com.google.android.gsf package any permission in their manifest. Another version of the modification allowed apps matching a list of package names and signatures to pass runtime permission checks even if the permission was not in their manifest. These issues have been fixed by the OEMs.
Keep an eye out at https://bugs.chromium.org/p/apvi/ for future disclosures of Google-discovered security issues under this program, or find more information there on issues that have already been disclosed.
Acknowledgements: Scott Roberts, Shailesh Saini and Łukasz Siewierski, Android Security and Privacy Team
Read More Announcing the launch of the Android Partner Vulnerability Initiative
Posted by Haining Chen, Vishwath Mohan, Kevin Chyn and Liz Louis, Android Security Team[Cross-posted from the Android Developers Blog] As phones become faster and smarter, they play increasingly important roles in our lives, functioning as our extended…Read More Lockscreen and Authentication Improvements in Android 11
The First Smartphone for Free-Ranging Kids In an earlier article, we took a look at smartphone alternatives for free-ranging kids. Next up is the follow-on conversation … the time you give them their first, fully functional smartphone—and how to manage having it in your lives. For children, learning to use a first smartphone is just […]Read More The First Smartphone for Free-Ranging Kids
Posted by Eugene Liderman and Xevi Miro Bruix, Android Security and Privacy Team Trust is very important when it comes to the relationship between a user and their smartphone. While phone functionality and design can enhance the user experience, securi…Read More Pixel 4a is the first device to go through ioXt at launch