Mobile

Pierluigi Paganini September 29, 2016
Why Apple logs your iMessage contacts and other metadata?

Every time you type a number to start an iMessage conversation on your iPhone, Apple logs your message contacts and other metadata. In January 2015, experts claimed that Apple is not able to read messages sent between devices through iMessages, but reported that the company but it is still able to access data in the backups. […]

Pierluigi Paganini September 25, 2016
Pippa Middleton private photos stolen in an Apple iCloud hack

In what could be another serious celebrity hack, 3,000 photos have been stolen from Pippa Middleton ’s account and they are being offered for sale. The UK Police is investigating the Pippa Middleton iCloud hack and consequent theft of private photos. According to The Sun newspaper the stolen photos were offered for sale, it seems that someone had […]

Pierluigi Paganini September 24, 2016
Cracking Apple iOS 10 Backup Encryption is now 2,500 times faster

Experts from Elcomsoft discovered a new vector of attack to access password-protected local backups produced by iOS 10 devices. According to security experts from the computer forensics company Elcomsoft, Apple has weakened the backup security protection of its recently-issued iOS 10 skipping certain security checks. This means that hackers could easily crack password protection used […]

Pierluigi Paganini September 23, 2016
Young hacker Luca Todesco announced the iPhone 7 jailbreak

The popular hacker Luca Todesco (aka @qwertyoruiopz) has announced the existence of the iPhone 7 jailbreak for devices running iOS 10. Only a few hours, this is the time spent by the popular hacker Luca Todesco (aka @qwertyoruiopz) to jailbreak the new and secure iPhone 7. The iPhone 7 was launched by Apple a few days ago and of […]

Pierluigi Paganini September 21, 2016
Experts found apps in Google Play serving the Overseer malware to overseas travelers

Google has removed from the Google Play store four apps trojanized with the Overseer malware to target overseas travelers seeking embassy information. Google has removed from the official Google Play store four trojanized apps that targeted overseas travelers seeking embassy information and news for specific European countries. Three apps were named “Embassy”, “European News”, “Russian […]

Pierluigi Paganini September 17, 2016
Researchers discovered security flaws in the Android version of Signal app

The security duo Markus Vervier and Jean-Philippe Aumasson have discovered multiple flaws in the Android version the popular Signal app. The security researchers Markus Vervier and Jean-Philippe Aumasson have discovered multiple vulnerabilities in the Android version of the secure messaging application Signal that can be exploited by a remote attacker to alter attachments and cause […]

Pierluigi Paganini September 15, 2016
A backdoor on Xiaomi device allows silent and remote deliver of any app

A Dutch Computer Science student discovered the presence of a backdoor that could allow an attacker to silently install any app on Xiaomi phones. A Dutch Computer Science student, Thijs Broenink, who analyzed his Xiaomi mobile device discovered the presence of a backdoor that could allow an attacker to silently install any app on the phone. The […]

Pierluigi Paganini September 07, 2016
CVE-2016-3862 flaw – Silently hack millions Androids devices with a photo

The CVE-2016-3862 flaw is a remote code execution vulnerability that affects the way images used by certain Android apps parsed the Exif data. Are you an Android user? I have a bad news for you, an apparently harmless image on social media or messaging app could compromise your mobile device. The last security updates issued by […]

Pierluigi Paganini September 05, 2016
NSO Group, the surveillance firm that could spy on every smartphone

The NSO Group is one of the surveillance companies that allow their clients to spy on their targets through almost any smartphone. It is quite easy for any Government to spy on mobile users, recently we have discussed the Trident vulnerabilities that were exploited by a surveillance software developed by the NSO Group to deliver the Pegasus […]

Pierluigi Paganini August 31, 2016
iOS 9.3.4 and minor versions are vulnerable to the Trident Exploit

Its name is the Trident: a chain of zero-day exploits that aim to infect iPhone with commercial spyware. Researchers linked it to the NSO group. Its name is the Trident: a chain of zero-day exploits that aim to infect iPhone with commercial spyware. Researchers say it’s belonging to an exploit infrastructure connected to the NSO […]