Mobile

Pierluigi Paganini April 22, 2016
FBI paid more than $1.3 million to hack into San Bernardino shooter iPhone

FBI Director Comey explained at the Aspen Security Forum in London that the Agency paid more than $1.3 million to break into San Bernardino shooter’s iPhone. FBI Director Comey explained at the Aspen Security Forum in London that the Agency paid more than $1.3 million to break into San Bernardino shooter’s iPhone The FBI vs […]

Pierluigi Paganini April 21, 2016
Healthcare Industry Tops List of Hacker Targets: More than 100 Million Medical Records Compromised in 2015

According to a research conducted by IBM the healthcare industry was a privileged target of cybercriminals last year, more than 100M Records Compromised. The healthcare industry was the number one target of cybercriminals in 2015, new research indicates. Previously, the banking industry held the top position. In 2015, more than 100 million healthcare records were […]

Pierluigi Paganini April 15, 2016
Canadian law enforcement obtained BlackBerry Global encryption Key

A report published by the VICE News confirmed that the Canadian law enforcement obtained the BlackBerry encryption Key under the investigation Op Clemenza. BlackBerry is probably the first mobile vendor that implemented end-to-end encryption to protect communications of its users. Now an embarrassing report published by Vice News revealed that BlackBerry has shared a master Key to […]

Pierluigi Paganini April 14, 2016
iOS date bug could be triggered over Wi-Fi spoofing an NTP server

A couple of security experts demonstrated that iOS date bug was still present in iOS devices and it was exploitable by spoofing an Apple NTP server. Do you remember the Apple iOS date bug? In February, the security community highlighted the existence of the embarrassing problem for Apple iOS mobile devices running 64-bit iOS 8 or higher, […]

Pierluigi Paganini April 13, 2016
Hacking Samsung Galaxy via Modem interface exposed via USB

Modems in a number of Samsung Galaxy devices are open to receiving AT commands over the USB cable even when they are locked Do you know that modems in a number of Samsung Galaxy devices are open to receiving AT commands over the USB cable even when they are locked? The circumstance is serious if we […]

Pierluigi Paganini April 08, 2016
The FBI director confirmed the purchase of a tool to hack the shooter’s iPhone, but …

The FBI Director James Comey confirmed the Agency had purchased a hacking tool to crack the San Bernardino shooter’s iPhone, but … The FBI has found a way to unlock any Apple iPhone, this is the opinion of the majority of security experts. Apple has expressed its concerns about the technique adopted by the Feds to access data […]

Pierluigi Paganini April 06, 2016
One Billion WhatsApp Users are now protected by End-to-End Encryption

Whatsapp now implements end-to-end encryption for all versions of the most popular messaging and voice calling application. Great news for privacy advocates and WhatsApp users, the software now implements end-to-end encryption for all versions of the most popular messaging and voice calling application. On Tuesday, the company announced the significant improvement to its 1 billion users with a blog […]

Pierluigi Paganini April 06, 2016
How to easily bypass iPhone 6s Lockscreen to access to Photos and Contacts

iPhone 6s and 6s Plus running the latest iOS version are plagued by a vulnerability that can be exploited to bypass the lockscreen. Another flaw plagues the new Apple iPhone 6s and 6s Plus, this time the mobile devices are affected by a Lockscreen Bypass vulnerability that could be exploited by local attackers to access […]

Pierluigi Paganini April 01, 2016
SideStepper method allows to infect iOS devices via MDM Solutions

SideStepper is a method to install malicious apps on iOS devices by abusing the mobile device management (MDM) solutions. Security researchers from the Check Point firm have devised a method to install a malicious code on iOS devices by abusing the mobile device management (MDM) solutions used by many enterprises. The technique relies on a vulnerability dubbed by […]

Pierluigi Paganini March 30, 2016
Following revelations on Paris attacks, US lawmakers target burner phones

Paris terrorists used burner phones and US lawmakers have proposed a bill that would force retailers to record the identity of the buyers of these devices. Law enforcement and intelligence agencies worldwide are fighting against terrorist organizations operating in their territories, but investigations are hampered by the use of encrypted communications. After the Paris attacks, intelligence agencies […]