Security News > 2015 > September > Google's researchers bypass Android feature that should have blocked Stagefright attacks (ZDNet)

2015-09-18 13:30
News URL
Related news
- Google adds Android auto-reboot to block forensic data extractions (source)
- 41% of Attacks Bypass Defenses: Adversarial Exposure Validation Fixes That (source)
- New Android malware steals your credit cards for NFC relay attacks (source)
- Phishers abuse Google OAuth to spoof Google in DKIM replay attack (source)
- SuperCard X Android Malware Enables Contactless ATM and PoS Fraud via NFC Relay Attacks (source)
- Google: 97 zero-days exploited in 2024, over 50% in spyware attacks (source)
- Researchers Demonstrate How MCP Prompt Injection Can Be Used for Both Attack and Defense (source)
- New "Bring Your Own Installer" EDR bypass used in ransomware attack (source)
- Update ASAP: Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers (source)
- Google fixes actively exploited FreeType flaw on Android (source)