Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Android banking malware whitelists itself to stay connected with attackers

Posted on November 17, 2016 by Dinesh Venkatesan

New Android.Fakebank.B variants use social engineering to bypass a battery-saving process and stay active in the background.

Read More

This entry was posted in Android, Banking Trojan, Endpoint Protection (AntiVirus), mobile banking Trojan, Mobile Malware, Security, Security Response by Dinesh Venkatesan. Bookmark the permalink.

Post navigation

← Previous Previous post: Microsoft’s New ‘Office 365 Hub’ Makes An Appearance in Insider Builds
Next → Next post: Android banking malware whitelists itself to stay connected with attackers

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • NIST tried to pull the pin on NTP servers after blackout caused atomic clock drift December 21, 2025
  • A Tiny Reflecting Telescope For Portable Astronomy December 21, 2025
  • Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence December 21, 2025
  • Building a Multi-Channel Pipette for Parallel Experimentation December 21, 2025
  • Bell Labs ‘Unix’ Tape from 1974 Successfully Dumped to a Tarball December 21, 2025

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2025 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up