Using social engineering tricks, a developer can create an app that tricks users into tapping a specifically-crafted app popup window (called toast view), making it a gateway for varied threats.This attack, dubbed tapjacking, takes advantage of a specific vulnerability in Android user interaction (UI) component. This technique is not very complicated but has serious security…
Read MoreYinfeng Qiu (Mobile Threat Analyst)
Mobile Threat Analyst
The permissions in Android devices are designed to guarantee that those Android apps without any declared permissions cannot do anything harmful to the mobile device. Or can they? How Android Permissions Work Before we get into the details, let’s see how Android permissions work. An Android app can access limited system resources. To access sensitive…
Read More