Mobile

Be careful backdoored Pokemon GO Android App spotted in the wild

ProofPoint have found in the wild a backdoored version of the popular Pokemon GO Android App that could allow attackers…

8 years ago

Hacking mobile via hidden voice commands embedded in YouTube videos

A group of researchers has devised a new method for hacking mobile devices by using hidden voice commands in YouTube…

8 years ago

Yingmob Chinese Ad Company infected 10 million Android devices for click revenue

Chinese Ad company Yingmob ’s developers are allegedly responsible for the infection of approximately 10 million Android devices. Chinese Ad…

8 years ago

Breaking Android Full-Disk Encryption, not so hard on Qualcomm devices

The Android full-disk encryption can be easily cracked with a brute force attack, hundreds of millions of Android mobile are…

8 years ago

Hummer Android malware already infected millions of devices

Experts from Cheetah Mobile firm revealed that the Hummer Android malware has already infected millions of smartphones worldwide. Security experts…

8 years ago

Apple confirms iOS 10 kernel source code left unencrypted intentionally

Apple confirms iOS 10 kernel code left unencrypted intentionally to improve OS performance and ensures that it will have no…

8 years ago

Tracking stolen smartphone is a bad idea, report it to the Police

Location services could very useful to find lost devices, but do not do anything silly to find your stolen smartphone,…

8 years ago

Pawost Android Malware uses Google Talk to make unwanted phone calls

Researchers at MalwareBytes have spotted a new Android Malware dubbed Pawost that uses Google Talk to make unwanted phone calls.…

8 years ago

Tesco Bank mobile app won’t run with Tor Orbot tool installed

This week it was discovered that the Tesco Android Bank app won't run with the Orbot privacy tool installed on…

8 years ago

Hacking Facebook Accounts with just a phone number through the SS7 protocol

Hacking Facebook Accounts with just a phone number is possible, experts from Positive Technologies demonstrated it exploiting flaws in the…

8 years ago

This website uses cookies.