Security researchers Threat Fabric recently discovered a brand new Android malware, named after the famous Greek historian, that includes a ‘humanizer’ mechanism for text input. That mechanism ...
Dangerous new NGate Android malware uses NFC to steal debit card and PIN info so that hackers can make cash withdrawals from ATMs.
According to CYFIRMA, the SpyLend Android malware is part of a group of malicious Android apps called “SpyLoan.” These apps are designed to look like financial tools or even loan services. They entice ...
Uhale Android-based digital picture frames come with multiple critical security vulnerabilities and some of them download and ...
Hundreds of malicious Android apps on Google Play were downloaded more than 40 million times between June 2024 and May 2025, ...
A new computer Trojan program attempts to install mobile banking malware on Android devices when they’re connected to infected PCs, according to researchers from Symantec. This method of targeting ...
In another example of how risky it can be to download apps from unauthorized sources, a new study has revealed that thousands of Android app files are laden with malware capable of escaping detection ...
It’s unfortunate how often we hear about apps containing malware on Google’s platform (not that they’re alone with a malware problem). Each time we learn about new trojans, it’s a reminder to stay ...
Bad actors constantly seek every bit of personal information they can get, from your phone number to your government ID. Now, a new threat targets both Android and iPhone users: SparkKitty, a powerful ...
Anu is a Features author at Android Police. You'll find her writing in-depth pieces about automation tools, productivity apps, and explainers. Before joining AP, she used to write for prominent tech ...
Parth is a technology analyst and writer specializing in the comprehensive review and feature exploration of the Android ecosystem. His work is distinguished by its meticulous focus on flagship ...
You may know—and be on the lookout for—malware hiding in programs that act legitimate, but aren't. But what happens when apps that are legitimate are unwittingly taken over by malicious users, intent ...