Mobile

GLitch attack, Rowhammer attack against Android smartphones now leverages GPU

A team of experts has devised the GLitch attack technique that leverages graphics processing units (GPUs) to launch a remote…

8 years ago

Do Not Disturb app will protect your device from evil maid attacks

Former NSA expert and white hat hacker Patrick Wardle has released an app named Do Not Disturb app that can be…

8 years ago

iOS users can now use Google prompt on their devices via the Gmail app

Google announced that iOS users can now benefit from Google prompt feature via their Gmail application. Security and usability are…

8 years ago

Are your Android devices updated? Researchers say maybe no

Probably you don't know that many Android smartphone vendors fail to roll out Google's security patches and updates exposing the…

8 years ago

KevDroid Android RAT can steal private data and record phone calls

  Security researchers discovered a new Android Remote Access Trojan (RAT) dubbed KevDroid that can steal private data and record…

8 years ago

Grindr shared people’ HIV status with other companies

An analysis conducted by the Norwegian research nonprofit SINTEF revealed that the popular Grindr gay dating app is sharing its users’…

8 years ago

A flaw in the iOS camera QR code URL parser could expose users to attacks

A vulnerability in the iOS Camera App could be exploited by hackers to redirect users to a malicious website, the…

8 years ago

Facebook collected call and SMS data from Android users if not explicitly forbidden

After the Cambridge Analytica scandal, Facebook made the headlines again, the company collected users' Android call and SMS metadata for…

8 years ago

TeleRAT, a new Android Trojan that uses Telegram for data exfiltration

Security experts at Palo Alto Networks discovered a new Android Trojan dubbed TeleRAT that uses Telegram Bot API to communicate with the…

8 years ago

New attacks on 4G LTE networks can allow to spy on users and spoof emergency alerts

A group of researchers discovered a number of weaknesses in the 4G LTE networks that could be exploited by attackers…

8 years ago

This website uses cookies.