CALL US

+91 9116117170

Category: Android

Android Banking Malware Stealing 2FA Codes From Google Authenticator

By Yash Kudal 0 Comment March 2, 2020

Security experts have discovered a new type of Android malware that can extract and steal one-time passcode (OTP) generated by Google Authenticator. A team of investigators say that they have seen an OTP stealing ability in Cerberus, a new android banking trojan which was launched last year. As per reports, the current type of Cerberus […]

Misconfigured firebase exposes users data

By Yash Kudal 0 Comment February 28, 2020

Investigators with the mobile security company Appthority have some disturbing news for iOS and Android mobile users: a vulnerability at the developer’s side revealing sensitive data. This disclosed information, including sensitive personal information, plain text passwords, and more, were affected as a result of what experts called Firebase vulnerability. Similar to other previously discovered application […]

ADB

What is ADB? ADB Latest Commands List

By Chandan Singh 0 Comment August 30, 2019

In this article, you will learn what is ADB? ADB Latest Command Lists, ADB (Android Debug Bridge) is, why users need it, and how to manage it using commands in the Android terminal. Well, let’s begin to study adb android commands. ADB (android debug bridge) is a debugging tool, detecting errors in applications, unlocking devices on Android […]

Malware Found in a widely popular App “CamScanner”

By Dibya Nayani Senapati 0 Comment August 29, 2019

Google play store is mostly considered as a safe haven for downloading any kind of software. But nowadays, nothing is 100% safe and most of the attackers are trying to generate new-new techniques to place their apps in Google Play. The malware was found on an application which is already present on Google Play and […]

AhMyth Android RAT – Remote Administration Tool

By Dibya Nayani Senapati 0 Comment August 24, 2019

There are more than 2.5 billion Android devices active each month and anyone of them can be hacked with the use of a remote administration tool known as RAT. RAT was basically created to provide technical support to the remote computer by allowing an administrator to log in and control the device directly. But hackers […]

error: Content is protected by Cyberops !!