A proof-of-concept (PoC) exploit for a local privilege elevation flaw impacting at least seven Android original equipment manufacturers (OEMs) is now publicly available on GitHub. However, as the ...
A team of academic researchers has uncovered a new Android security exploit that raises a lot of questions about the platform’s permission system. The technique, named TapTrap, uses user interface ...
Last week, I got on the phone with HD Moore to ask him how things have been going since he sold Metasploit to Rapid7, sending the open source security world into a frenzy some six months ago. Rapid7 ...
Manuel Vonau was Android Police's Google Editor until April 2024, with expertise in Android, Chrome, Pixels, and other Google products. For five years, he covered tech news and reviewed devices after ...
Developers have released a major update to the Metasploit security testing tool designed to run more smoothly on the Windows operating system. Metasploit 3.0, released early Tuesday morning, has been ...
Google's Threat Analysis Group (TAG) discovered several exploit chains using Android, iOS, and Chrome zero-day and n-day vulnerabilities to install commercial spyware and malicious apps on targets' ...
Developers have released a major update to the Metasploit security testing tool designed to run more smoothly on the Windows operating system. Metasploit 3.0, released early Tuesday morning, has been ...
Google’s September 2025 Android security bulletin is out, tackling several high-risk vulnerabilities, including four labeled critical. As per the company's latest security bulletin, the September 2025 ...
Android apps digitally signed by China’s third-biggest e-commerce company exploited a zero-day vulnerability that allowed them to surreptitiously take control of millions of end-user devices to steal ...
Amnesty International on Friday said it determined that a zero-day exploit sold by controversial exploit vendor Cellebrite was used to compromise the phone of a Serbian student who had been critical ...
Bas Bosschert, a self-billed “consultant/sysadmin/entrepreneur,” has demonstrated a proof-of-concept exploit that shows how the locally stored message database ...
Google warns that hijackers could get root access to your Android phone from an application using a security flaw that was first discovered two years ago. The flaw is part of the Linux Kernel, which ...