<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>InfoQ - Side channel vulnerabilities</title>
    <link>https://www.infoq.com</link>
    <description>InfoQ Side channel vulnerabilities feed</description>
    <item>
      <title>Pixnapping: Side-Channel Vulnerability Allows Android Apps to Capture Sensitive Screen Data</title>
      <link>https://www.infoq.com/news/2025/10/pixnapping-android-attack/?utm_campaign=infoq_content&amp;utm_source=infoq&amp;utm_medium=feed&amp;utm_term=Side+channel+vulnerabilities</link>
      <description>&lt;img src="https://res.infoq.com/news/2025/10/pixnapping-android-attack/en/headerimage/android-pixnapping-1760628647506.jpeg"/&gt;&lt;p&gt;A newly discovered class of attacks targets Android devices, allowing malicious apps to steal on-screen information from other apps using a technique known as pixel stealing. Dubbed Pixnapping, the attack leverages previously known side-channel vulnerabilities and affects virtually all apps, including Signal, Google Authenticator, Venmo, and many others.&lt;/p&gt; &lt;i&gt;By Sergio De Simone&lt;/i&gt;</description>
      <category>Mobile</category>
      <category>Side channel vulnerabilities</category>
      <category>Application Security</category>
      <category>Android</category>
      <category>Google</category>
      <category>Development</category>
      <category>news</category>
      <pubDate>Thu, 16 Oct 2025 17:00:00 GMT</pubDate>
      <guid>https://www.infoq.com/news/2025/10/pixnapping-android-attack/?utm_campaign=infoq_content&amp;utm_source=infoq&amp;utm_medium=feed&amp;utm_term=Side+channel+vulnerabilities</guid>
      <dc:creator>Sergio De Simone</dc:creator>
      <dc:date>2025-10-16T17:00:00Z</dc:date>
      <dc:identifier>/news/2025/10/pixnapping-android-attack/en</dc:identifier>
    </item>
  </channel>
</rss>
