Mobile

Breaking Android Full-Disk Encryption, not so hard on Qualcomm devicesBreaking Android Full-Disk Encryption, not so hard on Qualcomm devices

Breaking Android Full-Disk Encryption, not so hard on Qualcomm devices

The Android full-disk encryption can be easily cracked with a brute force attack, hundreds of millions of Android mobile are…

9 years ago
Hummer Android malware already infected millions of devicesHummer Android malware already infected millions of devices

Hummer Android malware already infected millions of devices

Experts from Cheetah Mobile firm revealed that the Hummer Android malware has already infected millions of smartphones worldwide. Security experts…

9 years ago
Apple confirms iOS 10 kernel source code left unencrypted intentionallyApple confirms iOS 10 kernel source code left unencrypted intentionally

Apple confirms iOS 10 kernel source code left unencrypted intentionally

Apple confirms iOS 10 kernel code left unencrypted intentionally to improve OS performance and ensures that it will have no…

9 years ago
Tracking stolen smartphone is a bad idea, report it to the PoliceTracking stolen smartphone is a bad idea, report it to the Police

Tracking stolen smartphone is a bad idea, report it to the Police

Location services could very useful to find lost devices, but do not do anything silly to find your stolen smartphone,…

9 years ago
Pawost Android Malware uses Google Talk to make unwanted phone callsPawost Android Malware uses Google Talk to make unwanted phone calls

Pawost Android Malware uses Google Talk to make unwanted phone calls

Researchers at MalwareBytes have spotted a new Android Malware dubbed Pawost that uses Google Talk to make unwanted phone calls.…

9 years ago
Tesco Bank mobile app won’t run with Tor Orbot tool installedTesco Bank mobile app won’t run with Tor Orbot tool installed

Tesco Bank mobile app won’t run with Tor Orbot tool installed

This week it was discovered that the Tesco Android Bank app won't run with the Orbot privacy tool installed on…

9 years ago
Hacking Facebook Accounts with just a phone number through the SS7 protocolHacking Facebook Accounts with just a phone number through the SS7 protocol

Hacking Facebook Accounts with just a phone number through the SS7 protocol

Hacking Facebook Accounts with just a phone number is possible, experts from Positive Technologies demonstrated it exploiting flaws in the…

9 years ago
Charging Mobile Devices could be very risky according to KasperskyCharging Mobile Devices could be very risky according to Kaspersky

Charging Mobile Devices could be very risky according to Kaspersky

Experts from Kaspersky Lab have conducted an experiment to demonstrate the risks for charging mobile devices with untrusted USB charging…

9 years ago
Unlimited surveillance capabilities, but it’s going to cost youUnlimited surveillance capabilities, but it’s going to cost you

Unlimited surveillance capabilities, but it’s going to cost you

Israeli company Ability Unlimited Interception System (ULIN) promises unlimited surveillance capabilities on any cell phone on the planet. Israeli-based company…

9 years ago
Android 6.0 Marshmallow permission-granting model is under attackAndroid 6.0 Marshmallow permission-granting model is under attack

Android 6.0 Marshmallow permission-granting model is under attack

Malware researchers are warning Android's latest permission-granting model in version 6.0 Marshmallow is now been targeted by Mobile malware authors.…

9 years ago