Tag : Android

Flappy-Bird

Mobile Friday: Flappy Bird Still Maliciously Flapping

Feb 14, 2014 By Sharon Solomon | The simplistic and straightforward Flappy Bird defied all odds and became one of the most popular games of early 2014. The sudden discontinuation of the app has disappointed millions of fans. But where there is disappointment, there is cybercrime potential. The single-player game conquered the mobile gamer’s hearts with its simple “Super Mario” type of gameplay, which has always proved to be compelling. Despite earning over $50,000 a day in in-game advertising revenue, the game was discontinued.

</Read More>
flickr-300x199

NSA Uses Angry Birds, Google Maps, & Other ‘Leaky’ Apps To Spy

Jan 28, 2014 By Sarah Vonnegut | We’re already well-informed of just how far-reaching the NSA’s data-tapping techniques are, but newly published leaks have taught us more methods to the NSA-madness. According to new documents furnished by Edward Snowden, the NSA and British-counterpart GCHQ have been tapping into commercial data troves collected by popular smartphone apps like Angry Birds and Google Maps as well as their third party advertisers. The information ranges from your gender to where you’re located to where you’re planning on going – and more.

</Read More>
iStock_000016399323XSmall

Cloned Minecraft for Android Doing the Rounds

Jan 17, 2014 By Sharon Solomon | The underground Android application market is booming. More and more pirated games are available for direct download on the net. One such game, the cloned Minecraft PE, is causing extensive damage all across the globe. Users of the Trojanized version are advised to uninstall the game immediately. The temptation is irresistible for any hardcore gamer. When costly games are available at a discount or even for free, downloading via the black-market becomes a no-brainer for many. But what is often forgotten is that mobile security is seriously compromised. The aforementioned Trojanized version of Minecraft PE, which is still available in various Russian pirate app stores, is a huge security risk. Available for 2.50 Euros, this cloned version infiltrates the system and exploits the victims’ cell phones.

</Read More>
iStock_000016399323XSmall

Top 3 Android Security Tips

Jan 02, 2014 By Sharon Solomon | Android  is enjoying an exponential growth. It’s estimated that Android Smartphone shipments exceeded the 1 billion mark in 2013. But this open-source platform has numerous security issues. Users are advised to step up their security awareness. The Android mobile platform made its entry into the smartphone market in late 2008. Despite lagging behind iOS and Windows Mobile for a couple of years, it is now the leading platform worldwide (over 80% market share in Q3 of 2013). Frequently changing passwords, using Android in-built security features and installing anti-virus programs are very useful and always recommended. But for extensive protection you can and should do more. Lets take a closer look.

</Read More>
iStock_000031868924XSmall

Samsung Galaxy S4 Vulnerability Exposed. Security Patch Now Available

Dec 23, 2013 By Sharon Solomon | The Galaxy S4, Samsung’s flagship device of 2013, is selling like hotcakes. The Korean giant has shipped over 40 million units in less than seven months. But not all has been rosy in recent weeks. The S4 has a serious security glitch, exposing all Samsung Account details and giving sniffers full access to private information. Mediatek Digital, a firm that tests the security standards of apps and mobile phones, recently exposed the serious flaw. Hackers can track the victims via GPS, access their recent call logs, configure call diverts and even turn off the device.

</Read More>
iStock_000020450842XSmall

Balloon Pop 2 Taken Off Android Play Store – WhatsApp Snooping Exposed

Dec 13, 2013 By Sharon Solomon | Mobile malware has come a long way in recent years. The latest exploit was exposed this week when the popular “Balloon Pop 2”, played and enjoyed by thousands of Android users, was found to contain a malicious code that enabled eavesdropping on WhatsApp conversations. Google has taken the game off its Play Store app market.

</Read More>
iStock_000025113752XSmall-225x300

Top-10 Essential Challenges of Mobile Security

Nov 29, 2013 By Sharon Solomon | Mobile Security has become a crucial aspect of protecting sensitive data and information. Malicious attacks once focused on PC’s have now shifted to mobile phones and applications. Mobile makers are aware of this fact and are investing heavily in security.

</Read More>
Untitled-11-300x242

[Japan 2012] Summary of CxSuite Seminar for Managers

Dec 19, 2012 By carolineb | Following the CxSuite Seminar for Managers which took place last month in Japan, here’s a summary (in Japanese) of  “Exterminating the root cause of vulnerabilities”, by Maty Siman, Founder and CTO at Checkmarx. Go to summary  

</Read More>
android-security-ITPromate-resized-600

Top 5 Apps to Keep Your Android Secure

May 23, 2012 By Administrator | Securing your data in an increasingly insecure world is no easy task. Backing up computer data,installing software that protects you from identity theft are just a few things we do to secure our data.  Think about it. Why wouldn’t you want to protect your Android Phone? It’s not only if you physically lose your phone with ALL the data on it. The pictures, emails, contacts, text messages, music, video. You all know that data is not so secure even when the phone is sitting in the palm of your hand. Below, we explore this security issue with real – life examples and give a few recommendations on apps to protect the data you need.  At work. In life.

</Read More>

Stay Connected

Sign up today & never miss an update from the Checkmarx blog

Follow us on Feedly

Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.

Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.