The abundance and variety of low cost Android phones is one of the reasons that Android has become so popular around the world. Unfortunately, low priced phones could also mean less operating revenue and thus possibly a lower quality control. Such is the case with a cheap Android phone and has a remote access trojan preinstalled.
An expert in Android security is warning users that some developers of crappy Android apps have come up with a new trick for fooling users into installing their apps.
Japanese scientists have discovered a new polymer glass that can heal itself and could be used as screen material for smartphones, TVs, PCs, laptops, tablets, and other electronics equipment.
Android bootloader components from five major chipset vendors are affected by vulnerabilities that break the CoT (Chain of Trust) during the boot-up sequence, opening devices to attacks.
An advertising software development kit (SDK) embedded in many legitimate apps has been secretly siphoning user data and sending it to the servers of a Chinese company.
At a recently concluded security conference, experts from an Israeli university have presented new research that describes a possible attack scenario which leverages replacement parts to carry out attacks on smartphones and other smart devices.
Starting next week Google will overhaul its two-step verification (2SV) procedure and replace one-time codes sent via SMS with prompts shown on the user's smartphone.
Two Chinese scientists have come up with a method of decrypting satellite phone communications, which works almost instantly and provides a third-party access to secure conversations in real-time.
Google's security team removed an Android app named "colourblock" from the official Play Store after security researchers from Kaspersky Labs discovered a dangerous trojan hidden inside it.
Google published yesterday a list of 42 smartphone models from 12 vendors that run up-to-date Android OS versions with the latest security patches applied.
A newly launched bot for the Discord online chat service is being abused by "attention seekers" for swat calls and for placing harassing calls, experts from Flashpoint have recently discovered.
Almost all recent OnePlus smartphones are vulnerable to attacks that can downgrade the phone's operating system and expose the device to previously patched security flaws.
A team of researchers from the Tandon School of Engineering at the New York University has created a method of generating fake digital fingerprints capable of unlocking random smartphones.
Hackers have exploited decades-old flaws in the SS7 mobile telephony protocol to hijack phone numbers and SMS messages, in order to bypass two-factor authentication (2FA) and steal money from bank accounts.
Mobile applications that open ports on Android smartphones are opening those phones to remote hacking, claims a team of researchers from the University of Michigan.
Scientists have developed a new type of material that could be used in the future to create self-healing electronics, such as smartphones, batteries, speakers, robotics, and others.