New SIM Card Flaw Lets Hackers Hijack Any Phone Just By Sending SMS

Cybersecurity researchers today revealed the existence of a new and previously undetected critical vulnerability in SIM cards that could allow remote attackers to compromise targeted mobile phones and spy on victims just by sending an SMS.

Dubbed “Sim… Continue reading New SIM Card Flaw Lets Hackers Hijack Any Phone Just By Sending SMS

RAMpage Attack Explained—Exploiting RowHammer On Android Again!

A team of security researchers has discovered a new set of techniques that could allow hackers to bypass all kind of present mitigations put in place to prevent DMA-based Rowhammer attacks against Android devices.

Dubbed RAMpage, the new technique (CV… Continue reading RAMpage Attack Explained—Exploiting RowHammer On Android Again!

LazyDroid – Android Security Assessment Tool

Lazydroid is a tool written as a bash script to facilitate some aspects of an Android Security Assessment. Features It provides some common tasks such as: Set the debug flag of an application to true Set the backup flag of an application to true Re-Build the application Re-Sign the application Smart log extraction of an […]

The post…

Read the full post at darknet.org.uk

Continue reading LazyDroid – Android Security Assessment Tool

First Android-Rooting Trojan With Code Injection Ability Found On Google Play Store

A new Android-rooting malware with an ability to disable device’ security settings in an effort to perform malicious tasks in the background has been detected on the official Play Store.

What’s interesting? The app was smart enough to fool Google security mechanism by first pretending itself to be a clean app and then temporarily replacing it with a malicious version.

Security researchers at

Continue reading First Android-Rooting Trojan With Code Injection Ability Found On Google Play Store

All Android Phones Vulnerable to Extremely Dangerous Full Device Takeover Attack

Researchers have discovered a new attack, dubbed ‘Cloak and Dagger’, that works against all versions of Android, up to version 7.1.2.

Cloak and Dagger attack allows hackers to silently take full control of your device and steal private data, including… Continue reading All Android Phones Vulnerable to Extremely Dangerous Full Device Takeover Attack

Over 1 Billion Mobile App Accounts can be Hijacked Remotely with this Simple Hack

Security researchers have discovered a way to target a huge number of Android and iOS apps that could allow them to remotely sign into any victim’s mobile app account without any knowledge of the victim.

A group of three researchers – Ronghai Yang, Wing Cheong Lau, and Tianyu Liu – from the Chinese University of Hong Kong has found [PPT] that most of the popular mobile apps that support

Continue reading Over 1 Billion Mobile App Accounts can be Hijacked Remotely with this Simple Hack

The Project Zero Contest — Google will Pay you $200,000 to Hack Android OS

Why waiting for researchers and bug hunters to know vulnerabilities in your products, when you can just throw a contest for that.

Google has launched its own Android hacking contest with the first prize winner receiving $200,000 in cash.

That’s a Hef… Continue reading The Project Zero Contest — Google will Pay you $200,000 to Hack Android OS

This Android Hacking Group is making $500,000 per day

Own an Android smartphone?

Hackers can secretly install malicious apps, games, and pop-up adverts on your smartphone remotely in order to make large sums of money.

Security researchers at Cheetah Mobile have uncovered one of the world’s largest and m… Continue reading This Android Hacking Group is making $500,000 per day