2018-08-01 | Johannes Ullrich | When Cameras and Routers attack Phones. Spike in CVE-2014-8361 Exploits Against Port 52869 |
2016-06-22 | Bojan Zdrnja | Security through obscurity never works |
2016-05-02 | Rick Wanner | Fake Chrome update for Android |
2015-07-28 | Rick Wanner | Android Stagefright multimedia viewer prone to remote exploitation |
2014-04-26 | Guy Bruneau | Android Users - Beware of Bitcoin Mining Malware |
2014-04-05 | Jim Clausing | Those strange e-mails with URLs in them can lead to Android malware |
2014-04-01 | Basil Alawi S.Taher | Upgrading Your Android, Elevating My Malware |
2012-05-18 | Johannes Ullrich | ZTE Score M Android Phone backdoor |
2012-03-03 | Jim Clausing | New automated sandbox for Android malware |
2011-11-01 | Russ McRee | Honeynet Project: Android Reverse Engineering (A.R.E.) Virtual Machine released |
2011-09-07 | Lenny Zeltser | Analyzing Mobile Device Malware - Honeynet Forensic Challenge 9 and Some Tools |
2011-05-18 | Bojan Zdrnja | Android, HTTP and authentication tokens |
2011-03-03 | Manuel Humberto Santander Pelaez | Rogue apps inside Android Marketplace |
2010-12-31 | Bojan Zdrnja | Android malware enters 2011 |
2010-01-11 | Johannes Ullrich | Fake Android Application |
2008-11-25 | Andre Ludwig | Tmobile G1 handsets having DNS problems? |