Mobile

Tesco Bank mobile app won’t run with Tor Orbot tool installed

This week it was discovered that the Tesco Android Bank app won't run with the Orbot privacy tool installed on…

9 years ago

Hacking Facebook Accounts with just a phone number through the SS7 protocol

Hacking Facebook Accounts with just a phone number is possible, experts from Positive Technologies demonstrated it exploiting flaws in the…

10 years ago

Charging Mobile Devices could be very risky according to Kaspersky

Experts from Kaspersky Lab have conducted an experiment to demonstrate the risks for charging mobile devices with untrusted USB charging…

10 years ago

Unlimited surveillance capabilities, but it’s going to cost you

Israeli company Ability Unlimited Interception System (ULIN) promises unlimited surveillance capabilities on any cell phone on the planet. Israeli-based company…

10 years ago

Android 6.0 Marshmallow permission-granting model is under attack

Malware researchers are warning Android's latest permission-granting model in version 6.0 Marshmallow is now been targeted by Mobile malware authors.…

10 years ago

Installing rogue apps on iOS devices via SandJacking Attack

The security expert Chilik Tamir from Mi3 Security has devised a new attack dubbed SandJacking to install rogue apps on…

10 years ago

Android will replace passwords with trust scores by 2017

Daniel Kaufman announced that Google is planning to make password identifications outmoded by 2017 and replace them with trust scores.…

10 years ago

John McAfee and his crew claim to have hacked a WhatsApp Message, But …

The popular security expert John McAfee and a team of four hackers demonstrated that is is possible to read WhatsApp…

10 years ago

Japanese Docomo makes its smartphone covertly trackable

The Japanese Mobile carrier NTT Docomo announced that its mobile devices will allow authorities to covertly track the locations of…

10 years ago

Researchers hack WhatsApp accounts through SS7 protocol

White Hackers from Positive Technologies demonstrate how to exploit SS7 protocol to impersonate WhatsApp and Telegram users and act on…

10 years ago

This website uses cookies.