WebView

AppWizard
February 19, 2026
Cybersecurity researchers have identified a new Android trojan named Massiv, designed for device takeover attacks targeting financial theft. It disguises itself as IPTV applications and poses risks to mobile banking users by allowing operators to remotely control infected devices for fraudulent transactions. The malware was first detected in campaigns targeting users in Portugal and Greece, with features including screen streaming, keylogging, SMS interception, and fake overlays for credential theft. One campaign specifically targeted the gov.pt application to deceive users into providing sensitive information. Massiv can execute various malicious actions, such as altering device settings, sending device information, and downloading malicious files. It is distributed through dropper applications that mimic IPTV services, often via SMS phishing. The malware operates in the background while the dropper appears as a legitimate app. Recent campaigns have focused on regions like Spain, Portugal, France, and Turkey, indicating a growing threat landscape. The operators of Massiv are developing it further, suggesting intentions to offer it as a Malware-as-a-Service.
AppWizard
February 19, 2026
Massiv is an Android banking Trojan that disguises itself as legitimate applications, primarily targeting users in southern Europe. It is distributed through side-loading and is capable of remote control over infected devices, enabling Device Takeover attacks that can lead to unauthorized banking transactions. Massiv often masquerades as IPTV applications to attract users seeking online television services. The malware employs overlay functionality to create deceptive screens, keylogging to capture sensitive information, and SMS/Push message interception. It can monitor applications on infected devices and present fake overlays to prompt users for sensitive data. Notably, it has targeted the Portuguese government application gov.pt and connects with Chave Móvel Digital, a digital authentication system, to access victims' banking accounts. Once it captures sensitive data, Massiv allows operators remote access to the device using Android’s AccessibilityService, facilitating real-time observation and manipulation of the user interface. It communicates over a WebSocket channel and supports screen streaming and UI-tree modes for enhanced control. Massiv's distribution includes malware droppers that initially do not contain malicious code but open a WebView to an IPTV website while the actual malware operates in the background. This tactic has increased in recent months, particularly in Spain, Portugal, France, and Turkey. Indicators of compromise include specific SHA-256 hashes and package names associated with the malware. The bot commands allow operators to perform various actions on the infected device, such as clicking coordinates, installing APKs, and showing overlays.
AppWizard
January 21, 2026
Google released the Android 16 QPR3 Beta 2 update for Pixel 6 and newer models, aiming to fix issues, including crashes of Microsoft applications. Despite the update, many users still report crashes, especially with work-related apps like Microsoft Teams. Some users experience crashes only on their work profiles, while others face issues regardless of the profile. A few users have reported no problems at all with Microsoft applications on the latest beta. Google specifically mentioned fixing issues related to Microsoft Intune, but regular users continue to face problems. One user found a workaround by enabling Android System WebView, which was previously disabled. There has been little activity on the Issue Tracker regarding these issues, and users may consider reverting to the stable version of Android 16 without losing data.
AppWizard
January 20, 2026
Pixel users are experiencing ongoing issues with Microsoft Office applications following the Android 16 QPR3 Beta 2 update, which was intended to fix previous crashing problems. Despite Google's assurances, many users report that glitches persist, particularly among beta users. Issues include crashes with specific Microsoft apps like Teams and the Microsoft Launcher. Some users report that apps crash in work profiles but function normally in personal profiles. A potential workaround involves re-enabling Android System WebView, but this solution is not widely verified. Google has not provided updates on the issues reported in the Issue Tracker, leaving users uncertain about a fix. Reverting to the stable version of Android 16 may serve as a temporary solution.
AppWizard
January 16, 2026
The past year saw a 45% increase in new vulnerabilities targeting Android. By the end of 2024, there are projected to be 2.87 million apps on Google Play, with 66% of American employees using personal smartphones for work. Mobile applications are responsible for 70% of digital interactions, and vulnerabilities in these apps contributed to approximately 40% of data breaches involving personal data in 2023. Effective Android App Vulnerability Scanners analyze app security by identifying insecure local storage, hardcoded credentials, weak cryptography, insecure network configurations, broken authentication flows, and misconfigured components. AI-powered scanners, like AutoSecT, can autonomously generate new scanning protocols quickly, detect zero-day vulnerabilities, automate penetration testing, and operate with near-zero false positives.
Winsage
January 14, 2026
On Tuesday, Microsoft released its first security update for 2026, addressing 114 vulnerabilities, including eight classified as Critical and 106 as Important. The vulnerabilities include 58 related to privilege escalation, 22 concerning information disclosure, 21 linked to remote code execution, and five categorized as spoofing flaws. A notable vulnerability, CVE-2026-20805, involves information disclosure within the Desktop Window Manager (DWM) and has a CVSS score of 5.5. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added this flaw to its Known Exploited Vulnerabilities catalog, requiring federal agencies to implement fixes by February 3, 2026. Additionally, Microsoft announced the expiration of three Windows Secure Boot certificates issued in 2011, effective June 2026, urging customers to transition to newer certificates to avoid disruptions. The update also removed vulnerable Agere Soft Modem drivers due to a local privilege escalation flaw (CVE-2023-31096) and addressed another critical privilege escalation flaw in Windows Virtualization-Based Security (CVE-2026-20876) with a CVSS score of 6.7. Other vendors, including Adobe, Amazon Web Services, and Cisco, have also released security patches for various vulnerabilities.
AppWizard
December 15, 2025
Google has removed the "Uninstall updates" button from the Play Store interface for core system apps, requiring users to navigate through the Settings app to roll back updates. This change affects several key system applications, including Android Auto, Android System WebView, and Pixel Camera Services. Users can now only find an "Open" button in the Play Store for these apps. To uninstall updates, users must long-press the app icon, select "App info," tap the three-dot menu, and choose "Uninstall updates." This alteration adds complexity to the process of reverting to earlier app versions.
BetaBeacon
December 8, 2025
Blockchain games use distributed ledgers to store assets and data, including progress tracking and digital economies. Blockchain technology and cryptocurrency integration have transformed digital entertainment, leading to the development of popular Web3 RPG titles like Axie Infinity. Games built on blockchain networks require devices with minimum requirements for Android version compatibility, CPU and GPU performance, RAM, storage, wallet integration, network connectivity, security, and battery life.
Search