The new Android Protected Confirmation API in Android P ensures that a human, not malware, is engaging with the app.
A team from a Dutch university have developed an attack that can remotely compromise some Android devices using the Rowhammer technique.
Recently, phishing attacks against Gmail users, a major U.S. financial services provider, and Android app users have revealed unique ways to deliver malware and steal login credentials.
What constitutes a backdoor in software, firmware, or even hardware? This question nagged at us during a recent project that Duo Labs worked on.
We at Duo Labs wanted to know if there is a difference between Nexus phones and other Android phones as it relates to security posture. Here are some of the key findings from our analysis: