Connect with us


Virus Infections Soar — Android Malware Developers Masquerade Malicious Software as COVID-19 Apps

McKenzie Elyse



We may earn a small commission when you click or purchase an item using a link on this website.

With the spread of the coronavirus pandemic, smartphone and desktop users have proven that claims of COVID-related information are their weak spot. Some speculate that the widespread confusion spurred by the viral pandemic has left many with their guard down in terms of virtual viruses, prompting malware developers to take advantage of the situation. Many different families of malicious software have been introduced to unsuspecting smartphone users since the pandemic started, masquerading as coronavirus tracking apps, instructional videos, and other related digital media.

This phenomenon began with the Vicious Panda malware campaign, which infected computers with malicious emails that claimed to offer information about the developing global situation. Since then, an influx of fake apps and other software has been unleashed across digital platforms, infecting devices with banking malware, spyware, and adware that gives the developer access to and/or control of information on the device.

Banking malware has seen the greatest amount of activity in terms of spreading malicious Android apps under the guise of useful COVID-19 information. Many of these apps can effectively pass as a legitimate application with basic functionality, while the developer uses hidden software within the app to siphon the victim’s banking credentials from their smartphone.

Non-banking trojans have also cropped up with the spread of the pandemic. A spyware known as ‘AhMyth’ was actually found added into an existing, previously benign application on Google Play. The app was originally created to show the evolution of the coronavirus; but the introduction of the malicious functionality, along with added permissions required to run the software, were all that was needed to jumpstart the malware.

‘AhMyth’ and other spyware lets the hacker send and read text messages, harvest files stored in the device, record audio, take photos with the camera, and even access the device’s location.

Perhaps one of the more alarming developments in malware technology is the ease of malware creation using a program called Metasploit. This penetration testing framework contains a suite of tools that can be used to test security vulnerabilities, execute attacks, and evade detection. A growing number of cybercriminals have been found using COVID-related applications made with Metasploit to inject their malicious code into legitimate apps. 

Metasploit is an open source project intended for network administrators to find weaknesses in their own networks and codify them with better security before a hacker can do it. Unfortunately, this project has been usurped in recent times by the very criminals it was supposed to counteract.

As the virus SARS-CoV-2 continues to wreak global havoc, so too can virtual viruses. Staying vigilant in the face of cybersecurity threats is as important as ever, with malware developers taking every opportunity they can to catch mobile users with their guard down.

I'm a copywriter, journalist, and web content creator with a strong passion for my work. Crafting narratives of the world around me brings me an incredible sense of joy — there's nothing I would rather be doing. Besides writing, I enjoy cooking, mixology, music, and my weird cat named Marceline.


Asus Confirms Launch Date for Zenfone 8, With ‘Mini’ Version Rumored

Colin Edge



Asus have announced a product launch that is set for May 12th in which the Zenfone 8 will receive its official unveiling. Rumors have swirled recently that the company plans to also release a mini version of the Zenfone 8 which has been all but confirmed by the launch event’s invite.

As part of the event, Asus released a new splash page on their website featuring the tagline “Big in performance, compact in size”, hinting that there may be a smaller model of the Zenfone 8 in the works.

In addition to the new splash page on Asus’s website, the company also sent physical invites to multiple news outlets. The folks over at PhoneArena reported on their physical invite noting that it came in the form of a screen protector in the dimensions of 5.83 inches x 2.72 inches.

The screen protector has been interpreted as a clue to what the actual dimensions of the Zenfone 8 or potential Zenfone 8 mini would be, and as PhoneArena noted, if the screen protector invite dimensions are the actual size of the phone, it will be just slightly than the iPhone 12 mini, which comes in at 5.18 inches x 2.53 inches.

The Android phone market has seen more compact handsets go out of style. While you still can find smaller Android phones on the market, they typically are lower quality phones or models of larger phones, making it reassuring that Asus promises the Zenfone 8 will be built with some of the best hardware on the market currently. Earlier this month, a Geekbench listing appeared online for an unnamed Asus phone that had the new Qualcomm Snapdragon 888 chip. If this was indeed a tech preview of the Zenfone 8 as many have been speculating, this means the phone should compete spec wise with the Samsung Galaxy S21 Ultra and the OnePlus 9 Pro.

While Asus has existed as a giant for quite some time in the computing market, their entry into the Android smartphone market has been much more quiet. With the Zenfone 8, Asus is looking to capture a sizable niche in the smartphone market: top tier, smaller phones. For now, we will have to wait until May 12th to see the full list of specs from Asus directly for the Zenfone 8, but the current hints towards size, memory and processor all point in the direction that Asus is aiming to compete with the highest end phones currently available for Android.

Continue Reading


Google Introduces ‘Android Ready SE’ to Promote the Adoption of Digital Keys, Mobile ID’s, and Digital Wallets with Added Security

Ben Smith



While the Android system has garnered wide praise by the Android community over the years for its open nature, the open nature of the system is subject to safety and privacy concerns. Google, however, is always looking at ways to innovate and improve the Android system by making the system faster, more convenient, and most importantly, more secure for their users.

With the expansion of the Android system past just smartphones and into the world of smart devices such as watches, TV’s and even cars, Google has set up the ‘Android Ready SE Alliance’ to offer new Android hardware with improved security functions. The Android Ready SE Alliance builds upon the already existing Secure Element (SE) technology that was first released in 2018 for the Pixel 3 with the Titan M chip and the tamper-resistant key storage for Android Apps through StrongBox.

In the Google Security Blog posting announcing the Android Ready SE Alliance, Google notes that StrongBox and tamper-resistant hardware has become an increasingly important requirement for new Android features related to digital keys for cars, homes and offices, mobile drivers’ licenses, ID’s, ePassports and digital wallet solutions.

While StrongBox and tamper-resistant hardware has become a major need in today’s world as smart devices expand and become a part of daily life, Google believes the SE technology is the perfect security solution for smart devices, as well as identity certification and digital wallet solutions. Google notes that all of these features will need to run on tamper-resistant hardware in order to protect the safety of their user’s data, keys, wallets, and more. The majority of modern Android phones now include the tamper-resistance hardware known as Secure Element (SE) and the company believes that the SE technology is the best path to introduce new consumers to better safety functions.

The aim of the Android Ready SE Alliance is to speed up the adoption of such technologies on Google’s Android platform. Google is allowing developers to develop open-source and ready-to-use applets for SE-capable microchips.

In addition, Google also announced that StrongBox will be applicable to WearOS, Android Auto Embedded and Android TV, and not limited to just Android smartphones or tablets but rather a wide range of Android devices in the Internet of Things device category.

Google has claimed that they currently in development on a few applets for Android devices that will be released according to priority, with mobile drivers’ licenses, identity credentials and digital keys being high in the priority list.  With the company announcing that an applet for the Android Ready SE Alliance is already released to be used by their OEM (original equipment manufacturer) partners to produce secure devices, we should begin to see Android Smart TVs and wearables featuring the secure technology in the coming months.

Overall, the aim of the Android Ready SE Alliance is to provide a better guarantee of safety and security to Android users when it comes to using digital wallets, ID tokens, and even keys, allowing for users to do their everyday tasks without ever having to worry about security again.

Continue Reading


Google Fires Second AI Ethicist, Changes Diversity and Research Policies

McKenzie Elyse



A recent internal investigation at Google has resulted in the second firing of a founding member of Google’s ethical AI development team. Margaret Mitchell was relieved of her position as co-leader of the ethical AI division for “[violating] the company’s code of conduct and security policies,” Google said in a statement. 

Her firing comes just two short months after her colleague and co-leader of the ethical AI team Timnit Gebru was abruptly let go after she attempted to publish research about the unintended consequences of large text processing systems, including those used by the Google search engine. Google did not approve the publication, citing that the paper “ignored too much relevant research.” Gebru had asked for further discussion before retracting the paper, and said that she planned to resign if the company failed to address her concerns. Google refused to meet the conditions and promptly relieved her of her position.

Gebru is a prominent data scientist who specializes in diversity and bias research in AI technology. She is best known for her research that found significant racial bias in facial recognition technology, showing that the algorithms recognize white faces better than black and brown faces. The dispute that led to Gebru’s firing prompted the resignation of two of her coworkers at Google, and sparked a media frenzy that has recently been amplified by Mitchell’s termination.

The investigation against Mitchell found that she had violated company policies by running automated scripts through Gebru’s email while searching for evidence that Google had discriminated against her. Many who witnessed the situation have publicly stated that Gebru was “wronged,” and have suggested that her undue exit from the company may have had a discriminatory basis.

Mitchell tweeted to her followers about her own firing: “I tried to raise concerns about race [and] gender inequity, and speak up about Google’s problematic firing of Dr. Gebru.”

Alphabet’s Google has come under major scrutiny in recent months following the DOJ’s lawsuit accusing the corporation of violating antitrust laws last October. Amid a slew of related lawsuits that paint Google as a monopolistic enterprise, the company has also been the center of a growing debate about its diversity policies and treatment of employees in minority groups. In response to the incidents involving Timnit Gebru and Margaret Mitchell, Google has recently implemented diversity and research policy changes in the hopes of preventing similar situations in the future.

Continue Reading

Sign Up For The Latest Bite Sized Tech News


    Would love your thoughts, please comment.x