Security News > 2016 > June > Malware devs scour GitHub for new ideas for bypassing Android security (Help Net Security)

Android malware developers are misusing techniques unearthed in GitHub projects to bypass security measures introduced in the latest versions of the mobile OS. GitHub, the largest host of source code in the world, is the home of a huge number of public projects. And, as we’ve witnessed in the example of Hidden Tear, the PoC ransomware published on GitHub by a Turkish computer engineering student, malware makers are happy to repurpose effective source code from … More →
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/krrI_K8uUhI/
Related news
- Android Malware Exploits a Microsoft-Related Security Blind Spot to Avoid Detection (source)
- Google's March 2025 Android Security Update Fixes Two Actively Exploited Vulnerabilities (source)
- BadBox malware disrupted on 500K infected Android devices (source)
- Microsoft admits GitHub hosted malware that infected almost a million devices (source)
- North Korea’s ScarCruft Deploys KoSpy Malware, Spying on Android Users via Fake Utility Apps (source)
- Fake "Security Alert" issues on GitHub use OAuth app to hijack accounts (source)
- GitHub project maintainers targeted with fake security alert (source)
- ⚡ THN Weekly Recap: GitHub Supply Chain Attack, AI Malware, BYOVD Tactics, and More (source)
- New Android malware uses Microsoft’s .NET MAUI to evade detection (source)
- APT36 Spoofs India Post Website to Infect Windows and Android Users with Malware (source)