Thursday, May 3, 2018

Persistent techniques used by Android Malware




What are the most commonly used persistent techniques by Android malware. That is to survive on device after reboot. In windows malware they change registry entries to auto start, Android malware should use similar techniques, couldn't find much details when googled. Any help is much appreciated. Thanks




No comments:

Post a Comment

samsung galaxy s 2 - Cannot restore Kies backup after firmware upgrade

I backed up my Samsung Galaxy S2 on Kies before updating to Ice Cream Sandwich. After the upgrade I tried to restore, but the restore fails ...