Malware on Android, though controversial, isn't exactly a new topic. But seeing a complete development suite that helps others create malware that has managed to evade Google Play Store's security is definitely an alarming development.
An incoming update to Play Services has some big security implications. Currently, Google verifies apps at a few different points, but there is no “always on” feature. With the update, Google will continue to verify your apps continually, in the background. Take that, malware.
Despite being removed from the Play Store, the story of Flappy Bird doesn't seem to be over just yet. Earlier this morning we learned the game was gone, and about how it will never be coming back. Developer Dong Nguyen mentioned that while speaking with Forbes. It was during that same conversation where he mentioned the subject of clones, even admitting to checking some out.
According to a new report from Cisco, Android was the target for 99% of all mobile malware last year. Unsurprisingly, Android users also have the highest “encounter rate” with web-delivered malware, at 71%. Our iOS counterparts fall short of those numbers, but there are a few omissions from the report which could explain quite a bit.
Security is not something one can afford to take for granted so easily anymore, especially considering how much our lives and identities have become tied to our mobile devices. That is why anti-malware company Malwarebytes is bringing its expertise and tools to Android with the Malwarebytes Anti-Malware Mobile app.
The threat of malware, and the fear and anxiety caused by it, has been a real issue even before smartphones became in vogue. And Android, being popular and, for the most part, open, has become a large target not only of such malicious actions but also of media focus. Now Google is breaking its silence and is claiming, at least based on data it has collected, that the media hype about Android malware may actually be a bit unwarranted.
The world's largest and most used mobile operating system is Android, as we all know, and some new documents that were recently revealed shows the US Government and feds calling out Android. Claiming it is a primary target for attacks, and they even back it up with numbers. A document was recently uncovered by Public Intelligence that is unclassified, but for "official use only" and it has all the details.
How much are we willing to sacrifice or to risk for the sake of convenience? If we're not careful, we could very well be handing over our digital lives to strangers with one single tap. This is the frightening situation painted by Craig Young from security firm Tripwire in his talk last Saturday at the Defcon security conference in Las Vegas.
Bluebox Security began talking about the Master Key exploit recently and it seems to be a popular topic amongst Android users. The original reports are saying this could have affected about 900 million devices. The exploit had been around for several years now, dating back the release of Android 1.6 Donut.
Bluebox Security has recently gone public with an exploit that is said to be able to affect up to 900 million Android phones. And if that number doesn't sound scary enough for Android users, putting it another way and you are looking at 99 percent of all Android phones that are in the wild. This exploit is referred to as 'Master Key' and it has apparently been around since Android 1.6 Donut -- around 4 years now.