{"id":1880,"date":"2024-09-03T04:04:47","date_gmt":"2024-09-03T04:04:47","guid":{"rendered":"https:\/\/icmscyber.com\/?p=1880"},"modified":"2024-09-03T04:04:52","modified_gmt":"2024-09-03T04:04:52","slug":"new-android-malware","status":"publish","type":"post","link":"https:\/\/icmscyber.com\/ja\/2024\/09\/03\/new-android-malware\/","title":{"rendered":"New Android Malware"},"content":{"rendered":"<p>NGate Steals NFC Data to Clone Contactless Payment Cards.<\/p>\n\n\n\n<p>Cybersecurity researchers have uncovered new Android malware that can relay victims&#8217; contactless payment data from physical credit and debit cards to an attacker-controlled device with the goal of conducting fraudulent operations.<\/p>\n\n\n\n<p>The malware &#8220;has the unique ability to relay data from victims&#8217; payment cards, via a malicious app installed on their Android devices, to the attacker&#8217;s rooted Android phone,&#8221; researchers Luk\u00e1\u0161 \u0160tefanko and Jakub Osmani said in an analysis.<\/p>\n\n\n\n<p>Read the full storey below:<\/p>\n\n\n\n<p><a href=\"https:\/\/thehackernews.com\/2024\/08\/new-android-malware-ngate-steals-nfc.html\">https:\/\/thehackernews.com\/2024\/08\/new-android-malware-ngate-steals-nfc.html<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>NGate Steals NFC Data to Clone Contactless Payment Cards. Cybersecurity researchers have uncovered new Android malware that can relay victims&#8217; contactless payment data from physical credit and debit cards to an attacker-controlled device with the goal of conducting fraudulent operations. The malware &#8220;has the unique ability to relay data from victims&#8217; payment cards, via a malicious app installed on their Android devices, to the attacker&#8217;s rooted Android phone,&#8221; researchers Luk\u00e1\u0161 \u0160tefanko and Jakub Osmani said in an analysis. Read the full storey below: https:\/\/thehackernews.com\/2024\/08\/new-android-malware-ngate-steals-nfc.html<\/p>","protected":false},"author":2,"featured_media":1881,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[6],"tags":[],"class_list":["post-1880","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/icmscyber.com\/ja\/wp-json\/wp\/v2\/posts\/1880","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icmscyber.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icmscyber.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icmscyber.com\/ja\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/icmscyber.com\/ja\/wp-json\/wp\/v2\/comments?post=1880"}],"version-history":[{"count":0,"href":"https:\/\/icmscyber.com\/ja\/wp-json\/wp\/v2\/posts\/1880\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/icmscyber.com\/ja\/wp-json\/wp\/v2\/media\/1881"}],"wp:attachment":[{"href":"https:\/\/icmscyber.com\/ja\/wp-json\/wp\/v2\/media?parent=1880"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icmscyber.com\/ja\/wp-json\/wp\/v2\/categories?post=1880"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icmscyber.com\/ja\/wp-json\/wp\/v2\/tags?post=1880"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}