Mobile

iOS Mobile Banking Apps, what is changed from 2013 tests?

The security expert Ariel Sanchez presented the results of the test conducted on 40 iOS banking apps, comparing them to…

10 years ago

Phone House – Personal data of 12+ million Dutch mobile customers open to hackers

Basically all Dutch citizens who own a mobile phone are at risk of attack due to poor security practices at…

10 years ago

A secret cellphone spying devices catalog leaked online

Someone in the Intelligence community leaked online a secret catalog of cellphone spying devices used by law enforcement. The Intercept…

10 years ago

BackStab Malware steals iOS and BlackBerry Backups

Security experts at Palo Alto Networks have uncovered a new strain of malware dubbed BackStab that steals local mobile data…

10 years ago

ISIS members have developed a mobile app for its communications

Ghost Security Group has reportedly discovered an Android mobile application used by members of the ISIS organization for secure communications.…

10 years ago

Millions of smart devices at risk from 3-year-old flaw

According to Trend Micro up to 6.1 million smart devices, including this smart TV and routers haven't patched a software…

10 years ago

Windows Phone hacked with Windows Phone Internals

Windows Phone Internals allows to unlock bootloader, enable Root access and create Custom ROM's on selected Windows Lumia mobile devices.…

10 years ago

Shedun adware can install any malicious mobile app by exploiting Android Accessibility Service

Shedun Trojanized adware family implements the ability to automatically install any app on the devices by exploiting the Android Accessibility…

10 years ago

Chrome exploit leaves million Android devices open to attack

At the MobilePwn2Own, a Chinese expert has demonstrated how to hijack an Android smartphone by exploiting a zero-day flaw in…

10 years ago

Snooping Samsung S6 calls with bogus base stations

A duo of security researchers, Daniel Komaromy of San Francisco and Nico Golde of Berlin, demonstrated how to intercept calls…

10 years ago

This website uses cookies.