Tagged articles
16 articles
Page 1 of 1
Black & White Path
Black & White Path
Apr 5, 2026 · Information Security

Alert: 2026 Zero‑Click Spyware Targets iPhone 17 and Android 16

A hacker known as xone9to1 posted on a dark‑web forum a so‑called “Zero‑click RAT” that can silently infect iPhone 17 (iOS 26.2) and Android 16, offering real‑time camera, microphone, wallet theft, and remote control capabilities, while experts debate its authenticity and advise urgent security updates.

Android SecurityCVE-2025-43529Zero-click RAT
0 likes · 5 min read
Alert: 2026 Zero‑Click Spyware Targets iPhone 17 and Android 16
Sohu Tech Products
Sohu Tech Products
Dec 17, 2025 · Mobile Development

Inside the AI Phone: How Bean Bag’s Device Bypasses Android Security and Captures Screens

An in‑depth analysis reveals that the Bean Bag AI phone avoids Android’s Accessibility Service by directly reading GPU buffers and injecting input events via hidden system APIs, runs a headless virtual screen, streams low‑resolution frames to the cloud for inference, and raises significant privacy and security concerns.

Android SecurityCloud InferenceGPU Buffer
0 likes · 8 min read
Inside the AI Phone: How Bean Bag’s Device Bypasses Android Security and Captures Screens
OPPO Amber Lab
OPPO Amber Lab
Nov 1, 2024 · Information Security

How ARM’s Memory Tagging Extension (MTE) Secures Android Memory – A Deep Dive

This article explores the challenges of memory safety in Android, explains the design and core mechanisms of ARM's Memory Tagging Extension (MTE), and details its hardware, compiler, kernel, and user‑space implementations, deployment options, and advantages over other memory‑protection techniques.

ARM architectureAndroid SecurityMTE
0 likes · 23 min read
How ARM’s Memory Tagging Extension (MTE) Secures Android Memory – A Deep Dive
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Aug 18, 2023 · Information Security

Shadow Call Stack (SCS) in Android: Mechanism, Requirements, and Implementation

Android’s Shadow Call Stack (SCS), silently enabled since Android R on AArch64 devices, stores return addresses in a protected register‑based stack separate from the regular stack, complementing stack canaries and requiring hardware support, while developers can activate it via -fsanitize=shadow-call-stack and avoid using X18 elsewhere.

Android SecurityAssemblyLLVM
0 likes · 7 min read
Shadow Call Stack (SCS) in Android: Mechanism, Requirements, and Implementation
OPPO Amber Lab
OPPO Amber Lab
Aug 11, 2023 · Information Security

How Android’s Shadow Call Stack Strengthens Kernel Security

This article explains Android's Shadow Call Stack (SCS) security mechanism, its hardware dependencies, enabling methods, and how it protects return addresses on AArch64 kernels, illustrated with code examples and real‑world deployment results.

Android SecurityKernel HardeningLLVM
0 likes · 6 min read
How Android’s Shadow Call Stack Strengthens Kernel Security
OPPO Amber Lab
OPPO Amber Lab
Nov 22, 2022 · Information Security

Key Takeaways from the 2022 XDef‑OPPO Security Salon Chengdu – Advanced Threat Defense

The 2022 XDef‑OPPO Security Salon in Chengdu gathered industry experts to discuss system‑level 3D defense, DOS attacks on data storage, Bluetooth memory flaws, cross‑device information flow, and Android hybrid security, offering deep insights and practical solutions for modern endpoint protection.

Android SecurityBluetooth VulnerabilityConference Summary
0 likes · 6 min read
Key Takeaways from the 2022 XDef‑OPPO Security Salon Chengdu – Advanced Threat Defense
Software Development Quality
Software Development Quality
Sep 22, 2022 · Information Security

Essential Android Security Testing Tools: A Comprehensive Guide

This article compiles a thorough list of Android security testing resources, covering online analysis platforms, static and dynamic analysis utilities, vulnerability scanners, reverse‑engineering tools, fuzzers, app‑repackaging detectors, market crawlers, miscellaneous aids, and references to academic publications and bug‑bounty programs.

Android SecurityDynamic analysisMobile Security
0 likes · 10 min read
Essential Android Security Testing Tools: A Comprehensive Guide
21CTO
21CTO
Mar 25, 2022 · Information Security

How Google Harvests Android Messages & Calls and What It Means for Your Privacy

This article reveals how Google secretly harvests Android Messages and call data, outlines the new privacy‑focused changes, showcases GNOME 42’s major UI and performance upgrades, and details the Lapsus$ breach involving a teenage mastermind that exposed Microsoft, Nvidia and Samsung source code.

Android SecurityGNOME 42Google privacy
0 likes · 7 min read
How Google Harvests Android Messages & Calls and What It Means for Your Privacy
vivo Internet Technology
vivo Internet Technology
Nov 10, 2021 · Mobile Development

Android mReferrer Security Analysis: Source Tracing and Anti-Forgery Solutions

The article reveals that Android’s Activity mReferrer field, derived from Context.getBasePackageName(), can be forged by overriding getBasePackageName(), outlines its data flow from ActivityTaskManagerService to Activity.attach, and recommends using the immutable UID via Binder.getCallingUid() for reliable source verification.

Activity InternalsAndroid SecurityAnti-Forgery
0 likes · 10 min read
Android mReferrer Security Analysis: Source Tracing and Anti-Forgery Solutions
WeChat Client Technology Team
WeChat Client Technology Team
Sep 28, 2017 · Information Security

How Tencent’s SOTER Secures Fingerprint Payments on Android

This article examines the challenges of implementing fingerprint‑based payment on Android, explains why early Android versions lacked a unified API, describes how Google’s FingerprintManager and TEE improve security, and details Tencent’s open‑source SOTER framework—including its key hierarchy, authentication flow, and integration steps—for building robust, low‑overhead biometric payment solutions.

Android SecuritySOTERSecure Payment
0 likes · 17 min read
How Tencent’s SOTER Secures Fingerprint Payments on Android
Hujiang Technology
Hujiang Technology
Dec 13, 2016 · Information Security

Common Pitfalls and Solutions When Building an APK Protection Tool

This article enumerates the typical traps encountered while developing an Android APK protection solution—such as signature verification, JNI library stripping, smali injection limits, magic‑number manipulation, and post‑obfuscation safeguards—and offers practical mitigation strategies for each.

APK protectionAndroid SecurityJNI
0 likes · 11 min read
Common Pitfalls and Solutions When Building an APK Protection Tool
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
Sep 22, 2016 · Information Security

2016 China Internet Counterfeit App Landscape Report

Based on Alibaba security data from January to August 2016, an analysis of 240 popular Android apps across 16 industry categories found that 83% had counterfeit versions, totaling 8,267 fake apps that infected 67.9 million devices, with social networking apps leading the fraud landscape.

Android SecurityChinaIndustry Analysis
0 likes · 3 min read
2016 China Internet Counterfeit App Landscape Report
Baidu Tech Salon
Baidu Tech Salon
Jun 10, 2014 · Information Security

How Baidu Mobile Security Achieved a Perfect Score in AV-Test’s Android Evaluation

AV‑Test’s May 2023 Android security assessment crowned Baidu Mobile Security’s antivirus engine with a flawless 100% detection rate, zero false positives, and full performance scores, marking its fourth consecutive top ranking while highlighting the role of big‑data analytics in combating emerging mobile threats.

AV-TestAndroid SecurityAntivirus
0 likes · 7 min read
How Baidu Mobile Security Achieved a Perfect Score in AV-Test’s Android Evaluation