+101 - Vote for the best Android Apps


101 Best Android Apps Archive

Posts Tagged ‘exploit’

[Update x3: Qualcomm responds] OnePlus left a backdoor in its devices capable of root access

Wednesday, November 15th, 2017

Just a month ago, OnePlus was caught collecting personally identifiable data from phone owners through incredibly detailed analytics.

Read More

[Update x3: Qualcomm responds] OnePlus left a backdoor in its devices capable of root access was written by the awesome team at Android Police.

[Update x2: OnePlus responds] OnePlus left a backdoor in its devices capable of root access

Tuesday, November 14th, 2017

Just a month ago, OnePlus was caught collecting personally identifiable data from phone owners through incredibly detailed analytics.

Read More

[Update x2: OnePlus responds] OnePlus left a backdoor in its devices capable of root access was written by the awesome team at Android Police.

OnePlus left a backdoor in its devices capable of root access

Tuesday, November 14th, 2017

Just a month ago, OnePlus was caught collecting personally identifiable data from phone owners through incredibly detailed analytics. While the company eventually reversed course on the data collection, another discovery has been made in the software of OnePlus phones. One developer found an application intended for factory testing, and through some investigation and reverse-engineering, was able to obtain root access using it.

 

The application in question is called 'EngineerMode,' which is intended to be used in factories to confirm that the device is working properly.

Read More

OnePlus left a backdoor in its devices capable of root access was written by the awesome team at Android Police.

Recently revealed “Cloak & Dagger” Android attack uses overlays and accessibility services to deceive users

Thursday, May 25th, 2017

maxresdefault

A new series of vulnerabilities in Android have been discovered by researchers at the University of California Santa Barbara and the Georgia Institute of Technology. Titled "Cloak & Dagger" this new class of vulnerabilities and attack vectors makes use of overlays and accessibility service permissions in Android. These services can potentially allow for a malicious application to perform unwanted actions, including collecting data input on the device and so-called "clickjacking." The latter term being when a user might believe they are performing one action, but another is occurring beneath a deceptive overlay.

Read More

Recently revealed "Cloak & Dagger" Android attack uses overlays and accessibility services to deceive users was written by the awesome team at Android Police.

Other Stuff

Sponsors

Apps Jobs - Search and advertise android apps jobs