Mobile

Pierluigi Paganini April 06, 2016
One Billion WhatsApp Users are now protected by End-to-End Encryption

Whatsapp now implements end-to-end encryption for all versions of the most popular messaging and voice calling application. Great news for privacy advocates and WhatsApp users, the software now implements end-to-end encryption for all versions of the most popular messaging and voice calling application. On Tuesday, the company announced the significant improvement to its 1 billion users with a blog […]

Pierluigi Paganini April 06, 2016
How to easily bypass iPhone 6s Lockscreen to access to Photos and Contacts

iPhone 6s and 6s Plus running the latest iOS version are plagued by a vulnerability that can be exploited to bypass the lockscreen. Another flaw plagues the new Apple iPhone 6s and 6s Plus, this time the mobile devices are affected by a Lockscreen Bypass vulnerability that could be exploited by local attackers to access […]

Pierluigi Paganini April 01, 2016
SideStepper method allows to infect iOS devices via MDM Solutions

SideStepper is a method to install malicious apps on iOS devices by abusing the mobile device management (MDM) solutions. Security researchers from the Check Point firm have devised a method to install a malicious code on iOS devices by abusing the mobile device management (MDM) solutions used by many enterprises. The technique relies on a vulnerability dubbed by […]

Pierluigi Paganini March 30, 2016
Following revelations on Paris attacks, US lawmakers target burner phones

Paris terrorists used burner phones and US lawmakers have proposed a bill that would force retailers to record the identity of the buyers of these devices. Law enforcement and intelligence agencies worldwide are fighting against terrorist organizations operating in their territories, but investigations are hampered by the use of encrypted communications. After the Paris attacks, intelligence agencies […]

Pierluigi Paganini March 29, 2016
FBI breaks into San Bernardino shooter’s iPhone

The Department of Justice says the FBI has broken into the iPhone used by the San Bernardino shooter, it no longer needs the help of Apple. The US Department of Justice (DoJ) announced it has broken into San Bernardino shooter‘s iPhone and it had accessed encrypted stored on the device. After a long battle between Apple and […]

Pierluigi Paganini March 27, 2016
Remotely Exploitable Flaw in Truecaller Leaves 100 Million Android Devices Vulnerable

Security researchers from the Cheetah Mobile Security Research Lab discovered a severe flaw in the call management application Truecaller. Recently, security researchers from the Cheetah Mobile Security Research Lab discovered a severe loophole in the popular phone call management application Truecaller. This vulnerability allows anyone to steal Truecaller users’ sensitive information, potentially opening doors for […]

Pierluigi Paganini March 23, 2016
Israeli Cellebrite firm is helping FBI in cracking San Bernardino shooter’s iPhone

The Israeli Cellebrite firm is helping the Federal Bureau of Investigation (FBI) in unlocking San Bernardino shooters’ iPhone. In the last weeks, we have followed the case of the San Bernardino shooter’s iPhone that a few days ago reached an unexpected conclusion, the FBI announced on Monday to have found a way to unlock the mobile device without […]

Pierluigi Paganini March 22, 2016
The FBI might be able to crack the San Bernardino terrorist’s iPhone without Apple’s help

The US authorities announced on Monday they may have found a way to unlock the San Bernardino shooters iPhone without the Apple’s help. The FBI says it may have discovered a method to bypass Apple security measures and unlock access the iPhone used by one of the San Bernardino attackers, and a today scheduled court hearing in the […]

Pierluigi Paganini March 22, 2016
Google issued an emergency patch for critical CVE-2015-1805 flaw

Google released an emergency security patch to fix the local elevation of privilege vulnerability CVE-2015-1805 affecting its OS. Google has released an emergency security patch to fix the local elevation of privilege vulnerability CVE-2015-1805 affecting the kernel of the Android OS of certain devices. The vulnerability is ranked as critical and can be exploited by rooting applications […]

Pierluigi Paganini March 21, 2016
An iOS zero-day allows iCloud photos and videos decryption

A group of researchers found an iOS zero-day that would let a skilled attacker decrypt photos and videos that were sent as secure instant messages. The bad news is that Matthew Green, a professor at Johns Hopkins University revealed that a zero-day vulnerability in iOS encryption allows skilled attackers to decrypt intercepted iMessages, the good […]