The Hacking Team, the Italian surveillance firm that was hacked recently, had developed Android malware that was able to sidestep Google's security checks and appear on Google Play as a legitimate news app called BeNews, according to security firm Trend Micro.
For the independent mobile developer, building an enterprise app is only half the battle. In a crowded market, getting the word out through a Web-based campaign can help put an effective app over the top, but few teams—often undermanned and overworked—choose to devote resources or lack the expertise to design marketing strategies.
Android users can now use their mobile devices to control their PCs with a free application from Intel.
Medical and banking mobile apps, as well as other mobile apps, could be at risk from hackers because of a flaw in the way app data is stored in cloud databases, according to researchers at Darmstadt Technology University and the Fraunhofer Institute for Security Information Technology.
Third-party keyboard app SwiftKey on Thursday made its SwiftKey for Android available on Google Play.
For enterprises that allow BYOD but don't have a security platform for Android devices, security risks abound. InformationWeek has identified eight Android security issues that IT should be concerned about.
An attacker could exploit security holes in Google Play and Android Web browsers to gain remote control of Android smartphones, warned Tod Beardsley with security firm Rapid7.
To encourage IT security researches to root out mobile app vulnerabilities, Google is expanding its bug bounty program to include vulnerabilities in mobile apps, wrote Eduardo Vela Nava, security engineer at Google, in a blog post.
Paying a fee to download a mobile game is "slowly disappearing," says Blake Jorgensen, chief financial officer at gaming firm Electronic Arts.
Mobile security company Lookout discovered five apps on the Google Play market that provided more than the "beating heart" and "epic smoke" wallpapers they advertised. Hidden beneath the animated veneer was malware that forced the user's smartphone to download Bitcoins, which were then transferred to proxy accounts.