• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • TrickGate, a packer used by malware to evade detection since 2016
  • IT Army of Ukraine gained access to a 1.5GB archive from Gazprom
  • Experts released VMware vRealize Log RCE exploit for CVE-2022-31706
  • GitHub to revoke stolen code signing certificates for GitHub Desktop and Atom
  • Pro-Palestine hackers threaten Israeli chemical companies
  • Pro-Russia group Killnet targets US healthcare with DDoS attacks
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Mobile (Page 76)

Mobile

P2P payment feature hidden in Facebook Messenger

The student Andrew Aude discovered a still unreleased feature for payments of Facebook Messenger by using the iOS and Mac OS X hacking tool Cycript. Facebook is preparing to enter the world of mobile payments according to a recent report published by...

October 8, 2014  By Pierluigi Paganini   Posted In  Hacking  Mobile  Security  Social Networks 

Flawed iOS 8’s Reset All Settings Option erases iCloud Docs

The MacRumors forum reported a serious flaw in iOS 8's 'Reset All Settings' Option which causes the deletion of iCloud Drive documents. The Fappening case has raised the question about the level of security offered by iCloud and other cloud storage...

October 1, 2014  By Pierluigi Paganini   Posted In  Hacking  Mobile 

FBI concerned about encryption by default for Smartphones

FBI Director James Comey said that he was "very concerned" about decision on Apple and Google to implement data encryption by default on their Smartphones. The FBI is concerned about the improvements made by Apple and Google for their solutions to defend...

September 27, 2014  By Pierluigi Paganini   Posted In  Mobile 

The iPhone 6 Touch ID fingerprint reader is still vulnerable to hack

Security expert Marc Rogers, chief security researcher at Lookout Mobile Security, revealed that Apple's Touch ID is still vulnerable to hack on iphone 6. A few days ago we discussed about the availability on the Internet of the exploit for iOS 7.x based...

September 24, 2014  By Pierluigi Paganini   Posted In  Hacking  Mobile  Security 

iOS 7_1 exploit for CVE-2014-4377 critical flaw publicly available

Users which haven’t upgraded their systems to the Apple iOS 8 could be victims of a new iOS 7.1 exploit targeting the CVE-2014-4377 vulnerability. Security experts at Binamuse firm have discovered the availability online of the exploit kit which targets...

September 23, 2014  By Pierluigi Paganini   Posted In  Hacking  Mobile 

Windseeker spyware app implements advanced injection and hooking techniques

Security experts at Lacoon Mobile Security detected a malicious app dubbed Windseeker which uses rare injection and hooking techniques to spy on users. Windseeker is a malicious Android app which attracted experts at Lacoon Mobile Security, the principal...

September 22, 2014  By Pierluigi Paganini   Posted In  Malware  Mobile 

Critical infrastructures – Main threats for 2G and 3G mobile networks

Which is the critical infrastructure of a country that is most exposed to cyber threat?  The question is difficult to answer, without doubts. Communication infrastructure is a vital component of every country and we add that unlike other infrastructure...

January 13, 2012  By Pierluigi Paganini   Posted In  Mobile  Security 


« First‹ Previous7273747576
Page 76 of 76



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
Go to mobile version