Device Monitor app for monitoring and reporting malicious events now available for Android

September 26, 2014, CORDIS

ACDC's partner, XLAB, has released the Device Monitor application to provide more mobile network security by monitoring and reporting malicious events on Android devices

The of is of great concern due to the way and intensity it is spreading, using countless hijacked resources to realize cyber-attacks.

Similar techniques that apply on personal computers and existing malware infrastructure can be reused on since the vast majority of the C&C communications are HTTPS-based.

The Device Monitor application, designed by XLAB, provides more mobile network security by monitoring and reporting malicious events on your Android device.

The main features of the app are detecting master-key and Fake ID exploits, SMS hijacks, visiting malicious URLs and warning users on applications with privilege that could leak private data. Detection is also done by searching the knowledgebase of malicious applications via Central-Clearing-House – used within the ACDC project.

In the next few months, Device Monitor will be deployed more widely within the ACDC infrastructure and become available via National Support Centers and ACDC's Community Portal.

ACDC - the Advanced Cyber Defence Centre – is operating since February 2013 as an EU CIP funded pilot project and involves 28 partners from 14 countries for a duration of 30 months until July 2015.

Beyond July 2015, ACDC aims to continue operating as a self-sustained Centre, building on its value as delivering the largest European source of data acquired through operators and end-users and a full set of solutions targeted both to help operators and end-users detect, mitigate and recover from botnet attacks.

The official release of and more information on the Device Monitor mobile app will be presented at the Internet Security Days ISD 2014, September 24th, in Bruehl, Germany.

Explore further: Security CTO to detail Android Fake ID flaw at Black Hat

More information: Device Monitor is available on Google Play: … c.xlab.devicemonitor

Related Stories

Security CTO to detail Android Fake ID flaw at Black Hat

July 29, 2014

Where have you heard this before: A team of security researchers discover a security flaw in Android devices. This is, however, news. This time, experts are talking about a flaw that involves a widespread vulnerability dating ...

Malware worms its way into more apps, study finds

June 24, 2014

Malicious software is increasingly making its way into mobile phones through "cloned" versions of popular apps, and software weaknesses in legitimate ones, security researchers said Tuesday.

Fighting the rise of the app attackers

February 26, 2014

Researchers have been given a share of £3 million by the Engineering and Physical Sciences Research Council (EPSRC) to counter cyber-criminals who are using malicious apps which can collude with each other to infect the ...

Surge in mobile network infections in 2013, says report

January 29, 2014

Alcatel-Lucent today released new data showing that security threats to mobile devices continues its rapid rise, infecting at any time more than 11.6 million devices and putting their owners at increased risk for stolen personal ...

Microsoft engineer eyeballs Android botnet

July 4, 2012

( -- A Microsoft engineer has spotted a botnet that targets Yahoo! Mail users using Android devices. Terry Zink , who also writes an Internet security blog, said he has evidence of a botnet running on Android devices ...

Recommended for you

Great white shark genome decoded

February 18, 2019

The great white shark is one of the most recognized marine creatures on Earth, generating widespread public fascination and media attention, including spawning one of the most successful movies in Hollywood history. This ...

How our plants have turned into thieves to survive

February 18, 2019

Scientists have discovered that grasses are able to short cut evolution by taking genes from their neighbours. The findings suggest wild grasses are naturally genetically modifying themselves to gain a competitive advantage.


Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.