Security News > 2016 > June > Malware devs scour GitHub for new ideas for bypassing Android security (Help Net Security)

Android malware developers are misusing techniques unearthed in GitHub projects to bypass security measures introduced in the latest versions of the mobile OS. GitHub, the largest host of source code in the world, is the home of a huge number of public projects. And, as we’ve witnessed in the example of Hidden Tear, the PoC ransomware published on GitHub by a Turkish computer engineering student, malware makers are happy to repurpose effective source code from … More →
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/krrI_K8uUhI/
Related news
- Android Malware Exploits a Microsoft-Related Security Blind Spot to Avoid Detection (source)
- Google Patches 47 Android Security Flaws, Including Actively Exploited CVE-2024-53104 (source)
- Google patches odd Android kernel security bug amid signs of targeted exploitation (source)
- Crypto-stealing iOS, Android malware found on App Store, Google Play (source)
- The XCSSET info-stealing malware is back, targeting macOS users and devs (source)
- SpyLend Android malware downloaded 100,000 times from Google Play (source)
- GitVenom Malware Steals $456K in Bitcoin Using Fake GitHub Projects to Hijack Wallets (source)
- 200-plus impressively convincing GitHub repos are serving up malware (source)
- Hundreds of GitHub repos served up malware for years (source)
- Qualcomm pledges 8 years of security updates for Android kit using its chips (YMMV) (source)