Mobile

One Billion WhatsApp Users are now protected by End-to-End Encryption

Whatsapp now implements end-to-end encryption for all versions of the most popular messaging and voice calling application. Great news for…

10 years ago

How to easily bypass iPhone 6s Lockscreen to access to Photos and Contacts

iPhone 6s and 6s Plus running the latest iOS version are plagued by a vulnerability that can be exploited to…

10 years ago

SideStepper method allows to infect iOS devices via MDM Solutions

SideStepper is a method to install malicious apps on iOS devices by abusing the mobile device management (MDM) solutions. Security researchers…

10 years ago

Following revelations on Paris attacks, US lawmakers target burner phones

Paris terrorists used burner phones and US lawmakers have proposed a bill that would force retailers to record the identity of…

10 years ago

FBI breaks into San Bernardino shooter’s iPhone

The Department of Justice says the FBI has broken into the iPhone used by the San Bernardino shooter, it no…

10 years ago

Remotely Exploitable Flaw in Truecaller Leaves 100 Million Android Devices Vulnerable

Security researchers from the Cheetah Mobile Security Research Lab discovered a severe flaw in the call management application Truecaller. Recently,…

10 years ago

Israeli Cellebrite firm is helping FBI in cracking San Bernardino shooter’s iPhone

The Israeli Cellebrite firm is helping the Federal Bureau of Investigation (FBI) in unlocking San Bernardino shooters’ iPhone. In the…

10 years ago

The FBI might be able to crack the San Bernardino terrorist’s iPhone without Apple’s help

The US authorities announced on Monday they may have found a way to unlock the San Bernardino shooters iPhone without the Apple's…

10 years ago

Google issued an emergency patch for critical CVE-2015-1805 flaw

Google released an emergency security patch to fix the local elevation of privilege vulnerability CVE-2015-1805 affecting its OS. Google has…

10 years ago

An iOS zero-day allows iCloud photos and videos decryption

A group of researchers found an iOS zero-day that would let a skilled attacker decrypt photos and videos that were…

10 years ago

This website uses cookies.