Project to detect collusion attacks on Android begins

Sooraj Shah
clock

Collusion attacks use malicious apps to circumvent Android controls in order to pass data to criminals

Coventry University's Dr Siraj Shaikh has begun a three-year cyber security project which focuses on the detection of collusion attacks. Collusion attacks use malicious applications to circumven...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
Android password managers vulnerable to 'AutoSpill' attack, researchers warn

Threats and Risks

Exploits a weakness in autofill functionality

clock 11 December 2023 • 2 min read
WhatsApp exploits commanding multi-million prices

Hacking

Security advances have made hacking an expensive endeavour.

clock 06 October 2023 • 2 min read
CISA adds Android zero-day to KEV catalogue

Threats and Risks

Vulnerability already used in Chinese shopping app Pinduoduo

clock 17 April 2023 • 2 min read

More on Threats and Risks

UK sanctions China-based hackers

UK sanctions China-based hackers

Attackers were targeting voters and politicians

clock 28 March 2024 • 3 min read
Russian cyber spies target German politicians in sophisticated phishing attack

Russian cyber spies target German politicians in sophisticated phishing attack

Germany's cyber agency BSI warned that state-backed hackers aimed to establish long-term access to German political networks

clock 25 March 2024 • 3 min read
Apple M-series CPU vulnerability enables attackers to purloin cryptographic keys from Macs

Apple M-series CPU vulnerability enables attackers to purloin cryptographic keys from Macs

US researchers find baked-in flaw

Graeme Burton
clock 22 March 2024 • 2 min read