androids
-
A new Zimperium report reveals that rooted Android phones and jailbroken iOS devices face growing threats, with advanced toolkits making detection nearly impossible for cybersecurity researchers.
-
Google is working on a new security feature for Android that blocks device owners from changing sensitive settings when a phone call is in progress. Specifically, the in-call anti-scammer protections include preventing users from turning on settings to install apps from unknown sources and granting accessibility access. The development was first reported by Android Authority.…
-
Google is pushing back against a court decision that forces it to make changes to Android and Google Play, all thanks to Epic Games’ request. The tech giant argues that these changes could mess with user privacy, make it harder for developers to get their apps noticed, and ultimately hurt competition. While these adjustments might…
-
Back in May, we learned Google was planning some interesting security features for devices running Android 10 and newer. These options were specifically designed for stopping thieves from accessing your smartphone’s data should it be stolen, which is quite useful—even if they might not necessarily prevent that theft in the first place. Six months later,…
-
Something to look forward to: Losing your device to theft is more than just a financial hit, there’s the hassle of remote wiping it so that no one gets access to your private data and photos, and perhaps even canceling saved payment methods. It’s a real headache. But there’s good news for Android users: new…
-
The Register reports that Google “recently rewrote the firmware for protected virtual machines in its Android Virtualization Framework using the Rust programming language.” And they add that Google “wants you to do the same, assuming you deal with firmware.” A post on Google’s security blog by Android engineers Ivan Lozano and Dominik Maier promises to…
-
BaseMirror: Automatic Reverse Engineering of Baseband Commands from Android’s Radio Interface Layer
·
arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.
-
Where am I??? NOTE: portions of this post appeared in my presentation at the 2024 SANS DFIR Summit.
-
Recent research by cybersecurity company ESET provides details about a new attack campaign targeting Android smartphone users.
-
Samsung and Bank of America didn’t immediately respond to requests for comment for this story. Google and Epic both declined to comment.
-
Yet Google and its hardware partners argue privacy and security are a major focus of the Android AI approach. VP Justin Choi, head of the security team, mobile eXperience business at Samsung Electronics, says its hybrid AI offers users “control over their data and uncompromising privacy.”
-
The Android Security Bulletin details security vulnerabilities affecting Android devices, where devices with security patch levels of 2024-07-05 or later address these issues, while Android partners are notified of vulnerabilities in advance and source code patches are released.
-
On Monday, Google released the July 2024 security patches for the Android operating system, which address several critical vulnerabilities, including one affecting the Framework component.
-
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos:
-
We’re at now, now. Back in December of 2023 Google announced a change to Android’s Location History feature that got quite a bit of attention. Prior to the announcement, users could view their location history via the Google Maps application and any web browser where they were signed in. That meant the data was stored…
-
New Tracker Warning Features on iPhones & Androids, 2024 Verizon Data Breach Investigations Report
·
In episode 330 Tom, Scott, and Kevin discuss the new features for iPhones and Android phones designed to warn users about secret trackers, possibly aiding in identifying stalkers. The hosts discuss Apple and Google’s collaboration on a technology called DOLT (Detecting Unwanted Location Trackers), aiming to improve user privacy by detecting Bluetooth trackers like Tiles…
-
Our research found that lost items are typically left behind in stationary spots. For example, you lose your keys at the cafe, and they stay at the table where you had your morning coffee. Meanwhile, a malicious user is often trying to engage in real-time tracking of a person. By applying rate limiting and throttling…
-
In April’s update for the Android operating system (OS), Google has patched 28 vulnerabilities, one of which is rated critical for Android devices equipped with Qualcomm chips.
-
Although I generally work at home or in the office, from time to time I tend to work from other locations. For example, from a train to take advantage of the travel time or when I feel like having something in a cafe to disconnect a little while I finish a task. I never connect…