Mobile

How to Bypass iPhone Passcode and access personal data on the deviceHow to Bypass iPhone Passcode and access personal data on the device

How to Bypass iPhone Passcode and access personal data on the device

A new flaw allows to bypass the iPhone Passcode protection, even when Touch ID is properly configured, and access photos…

9 years ago
Experts spotted a secret backdoor in Android phones that sends data to ChinaExperts spotted a secret backdoor in Android phones that sends data to China

Experts spotted a secret backdoor in Android phones that sends data to China

Experts at Kryptowire discovered a mobile phone firmware that transmitted personally identifiable information without user consent due to a backdoor.…

9 years ago
Malvertising campaign delivered Android Svpeng Trojan via a zero-day in ChromeMalvertising campaign delivered Android Svpeng Trojan via a zero-day in Chrome

Malvertising campaign delivered Android Svpeng Trojan via a zero-day in Chrome

Kaspersky discovered a new strain of the Svpeng Trojan delivered through popular news websites using Google’s AdSense via a zero-day…

9 years ago
Abusing protocols in LTE networks to knock mobile devices off networksAbusing protocols in LTE networks to knock mobile devices off networks

Abusing protocols in LTE networks to knock mobile devices off networks

A group of researchers from Nokia Bell Labs and Aalto University in Finland demonstrated how to hack protocols used in…

9 years ago
How to Exploit Belkin WEMO gear to hack Android devicesHow to Exploit Belkin WEMO gear to hack Android devices

How to Exploit Belkin WEMO gear to hack Android devices

Belkin’s WeMo home automation firmware that’s in use in several IoT devices has recently been found vulnerable to an SQL…

9 years ago
One oAuth 2.0 hack, 1 Billion Android App Accounts potentially exposedOne oAuth 2.0 hack, 1 Billion Android App Accounts potentially exposed

One oAuth 2.0 hack, 1 Billion Android App Accounts potentially exposed

Security researchers demonstrated that a Wrong oAuth 2.0 implementation allows a remote simple hack that exposes more than 1 Billion…

9 years ago
Pwn2Own 2016 – Keen Team won $215k by hacking Nexus 6p and iPhone 6SPwn2Own 2016 – Keen Team won $215k by hacking Nexus 6p and iPhone 6S

Pwn2Own 2016 – Keen Team won $215k by hacking Nexus 6p and iPhone 6S

Tencent Team Keen won $215k at PWN2OWN Mobile by hacking Nexus 6p and using two exploits for the iPhone iOS…

9 years ago
Cellebrite digital forensics tools leaked online by a resellerCellebrite digital forensics tools leaked online by a reseller

Cellebrite digital forensics tools leaked online by a reseller

The firmware used by the Israeli mobile forensic firm Cellebrite was leaked online by one of its resellers, the McSira…

9 years ago
Upgrade your iPhone to iOS 10.1 or you can get hacked by opening a JPEG or a PDFUpgrade your iPhone to iOS 10.1 or you can get hacked by opening a JPEG or a PDF

Upgrade your iPhone to iOS 10.1 or you can get hacked by opening a JPEG or a PDF

Viewing a maliciously crafted JPEG may lead to arbitrary code execution, a boobytrapped JPEG could compromise your iPhone. Upgrade to…

9 years ago
Millions of Android smartphones exposed to new Drammer Android attackMillions of Android smartphones exposed to new Drammer Android attack

Millions of Android smartphones exposed to new Drammer Android attack

A new method of attack dubbed DRAMMER could be exploited to gain 'root' access to millions of Android smartphones and…

9 years ago