Read more about Black Hat
Bookmark and Share
  • 1,500 severe security events detected on Black Hat WLAN

    30.07.2012

    The WLAN network at Black Hat was accessed by 3,155 attendees with a maximum of 904 simultaneous clients, detected and quickly contained a total of 1,561 severe independent security events.

  • Researchers beat Google's Bouncer

    27.07.2012

    When earlier this year Google introduced Bouncer - an automated app scanning service that analyzes apps by running them on Google’s cloud infrastructure and simulating how they will run on an Android device - it shared practically nothing about how it operates, in the hopes of making malicious app developers' scramble for a while to discover how to bypass it.

  • Detect and shut down rogue mobile apps

    27.07.2012

    To counter the emergence of malicious and unauthorized apps appearing on mobile app stores, RSA introduced the RSA FraudAction Anti Rogue App Service designed to detect and take action against rogue mobile apps that attempt to serve up malware or phishing attacks.

  • First holistic security platform unveiled at Black Hat

    27.07.2012

    AccessData released Cyber Intelligence & Response Technology 2 (CIRT 2), a platform that integrates network and computer forensics, malware analysis, large-scale data auditing and remediation.

  • Hidden security risks of top mobile apps

    26.07.2012

    Appthority cast a spotlight on the hidden behaviors of the top free mobile apps.




Spotlight

Android Fake ID bug allows malware to impersonate trusted apps

Posted on 29 July 2014.  |  Bluebox Security researchers unearthed a critical Android vulnerability which can be used by malicious applications to impersonate specially recognized trusted apps - and get all the privileges they have - without the user being none the wiser.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Jul 29th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //