The Latest in IT Security

Malicious Android Apps Can Impersonate Trusted Ones

30
Jul
2014

A serious vulnerability has been discovered in Android that could potentially lead to completely compromising devices running versions of the mobile operating system lower than 4.4 (KitKat).The flaw allows malicious apps to impersonate trusted ones behind the users back, and benefit from the same access permissions as the legitimate software. This presents the risk of attackers to reach financial information and even take full control of the Android device.Researchers at Bluebox Securit…

Comments are closed.

Categories

SATURDAY, APRIL 20, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments