The MediaTek vulnerability affecting 875 million Android phones allows SIM card exploits to bypass lock screens in seconds.
One in 4 Android phones potentially affected by a staggering security vulnerability that allowed hackers to access locked and protected handsets in less than 60 seconds.
A new exploit, dubbed "Qualcomm GBL exploit," is being chained with other exploits to bring bootloader unlocking to several flagship phones.
A team of academic researchers has uncovered a new Android security exploit that raises a lot of questions about the platform’s permission system. The technique, named TapTrap, uses user interface ...
Pixnapping could be used to steal private data, including 2FA codes. Side-channel attack abuses Google Android APIs to steal data on display. Flaw is partially patched, although a more complete fix is ...
Microsoft confirms Authenticator flaw could allow disclosure of your one-time codes. iOS and Android users are urged to ...
Caribou is an Android app that does what RFID cardkeys do with locked doors. Caribou remotely connects to a server managing the locks at a supposedly secure location, and exploits the servers’ poor ...
Google’s September 2025 Android security bulletin is out, tackling several high-risk vulnerabilities, including four labeled critical. As per the company's latest security bulletin, the September 2025 ...
Like any other computer, smartphones are prone to some nasty malware, and the latest exploit discovered in Android is equal parts ingenious and horrifying. The last thing most Android users worry ...
Amnesty International on Friday said it determined that a zero-day exploit sold by controversial exploit vendor Cellebrite was used to compromise the phone of a Serbian student who had been critical ...
The post Qualcomm GBL Exploit Reportedly Enables Bootloader Unlocking on Flagships appeared first on Android Headlines.
Android Malware Exploits a Microsoft-Related Security Blind Spot to Avoid Detection Your email has been sent .NET MAUI’s hidden danger Bypassing security Malware’s evolving tactics The blob advantage ...