Mobile

Hacking Team compromised non-jailbroken iOS devicesHacking Team compromised non-jailbroken iOS devices

Hacking Team compromised non-jailbroken iOS devices

Security experts from FireEye demonstrated that Hacking Team leveraged iOS vulnerability to install fake messaging apps implementing a Masque Attack.…

10 years ago
CVE-2015-3823 Android bug phones in endless rebootsCVE-2015-3823 Android bug phones in endless reboots

CVE-2015-3823 Android bug phones in endless reboots

Trend Micro revealed that Android users are threatened by another vulnerability coded as CVE-2015-3823 which traps mobile phones in endless…

10 years ago
TaiG Jailbreak for Mac, tool for jailbreaking iOS 8.4 (Mac OS X version) ReleasedTaiG Jailbreak for Mac, tool for jailbreaking iOS 8.4 (Mac OS X version) Released

TaiG Jailbreak for Mac, tool for jailbreaking iOS 8.4 (Mac OS X version) Released

Apple's iOS 8.4 operating system for Mac OS X can be jail broken now, thanks to the Untethered Jailbreak tool…

10 years ago
Trend Micro revealed a new Android vulnerability renders Android Devices inoperableTrend Micro revealed a new Android vulnerability renders Android Devices inoperable

Trend Micro revealed a new Android vulnerability renders Android Devices inoperable

Researchers from Trend Micro discovered a new critical vulnerability in the Android mobile OS that can be exploited to crash…

10 years ago
Stagefright, just a message to hack 950 Million Android devicesStagefright, just a message to hack 950 Million Android devices

Stagefright, just a message to hack 950 Million Android devices

Android users are threatened by a new vulnerability dubbed Stagefright in the popular Google mobile OS, which allows hackers to…

10 years ago
Advertising hijacking made by Invisible rogue mobile apps are wasting petabytes of data a dayAdvertising hijacking made by Invisible rogue mobile apps are wasting petabytes of data a day

Advertising hijacking made by Invisible rogue mobile apps are wasting petabytes of data a day

Mobile Malware is growing and crooks are targeting the advertising industry to redirect users to ad pages in a sort…

10 years ago
All Smartwatches on the market are vulnerable to attacksAll Smartwatches on the market are vulnerable to attacks

All Smartwatches on the market are vulnerable to attacks

A study conducted by HP's Fortify on security features implemented by Smartwatches revealed that not even a single device found…

10 years ago
Android devices, from Ice Cream version to Jelly Bean were p0wned with RCSAndroidAndroid devices, from Ice Cream version to Jelly Bean were p0wned with RCSAndroid

Android devices, from Ice Cream version to Jelly Bean were p0wned with RCSAndroid

Android devices, from Ice Cream version to Jelly Bean were p0wned with RCSAndroid RAT, one of the most professionally developed…

10 years ago
Researcher discloses Local Privilege Escalation Flaw in Apple Mac OS XResearcher discloses Local Privilege Escalation Flaw in Apple Mac OS X

Researcher discloses Local Privilege Escalation Flaw in Apple Mac OS X

Researchers have discovered a critical local privilege escalation (LPE) vulnerability in the Mac OS X operating system, but Apple will…

10 years ago
Security Affairs newsletter Round 18 – Best of the week from best sourcesSecurity Affairs newsletter Round 18 – Best of the week from best sources

Security Affairs newsletter Round 18 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…

10 years ago