Security News > 2016 > June > Malware devs scour GitHub for new ideas for bypassing Android security (Help Net Security)
Android malware developers are misusing techniques unearthed in GitHub projects to bypass security measures introduced in the latest versions of the mobile OS. GitHub, the largest host of source code in the world, is the home of a huge number of public projects. And, as we’ve witnessed in the example of Hidden Tear, the PoC ransomware published on GitHub by a Turkish computer engineering student, malware makers are happy to repurpose effective source code from … More →
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/krrI_K8uUhI/
Related news
- New LianSpy malware hides by blocking Android security feature (source)
- Week in review: VMware ESXi zero-day exploited, SMS Stealer malware targeting Android users (source)
- Ransomware gang deploys new malware to kill security software (source)
- GitHub Patches Critical Security Flaw in Enterprise Server Granting Admin Privileges (source)
- Android malware uses NFC to steal money at ATMs (source)
- New NGate Android malware uses NFC chip to steal credit card data (source)
- Cybercriminals Deploy New Malware to Steal Data via Android’s Near Field Communication (NFC) (source)
- New Android Malware NGate Steals NFC Data to Clone Contactless Payment Cards (source)
- GitHub comments abused to push password stealing malware masked as fixes (source)
- Android Users Urged to Install Latest Security Updates to Fix Actively Exploited Flaw (source)