Researchers at CSE Cybsec ZLab analyzed a malicious code involved in a long-term espionage campaign in Syria attributed to a…
Once USB Restricted Mode is enabled on a device, no data communications occur over the Lightning port, but experts found…
This week Google released the July 2018 Android patches that address tens of vulnerabilities in the popular mobile operating system.…
Israeli military intelligence accused Hamas operatives of creating tainted apps to lure soldiers into downloading spyware onto their phones. According…
This week researchers demonstrated that most Android phones released since 2012 are still vulnerable to the RAMpage attack. In 2012,…
Some Samsung devices are randomly sending photos taken with the camera to contacts in the address book without permission. Do…
Security issues in the LTE mobile device standard could be exploited by persistent attackers to spy on users' cellular networks…
Security Researchers demonstrated how a "poisoned" cellphone battery in smartphones can be leveraged to "infer characters typed on a touchscreen We've…
A security researcher has devised a method to brute force a passcode on every Apple iPhone or iPad, even the…
Malware researchers from ESET have discovered a new strain of Android RAT, tracked as HeroRat, that leverages Telegram protocol for command…
This website uses cookies.