Security researchers at Trend Micro Security firm discovered that 1 in 20 Android apps open to attack due to a flaw in the Apache Cordova API Framework. Researchers at Trend Micro have discovered a serious vulnerability (CVE-2015-1835) in the Apache Cordova mobile API framework, that could be exploited by remotely by attackers to modify the behavior […]
According to a senior fellow for Lockheed IT, the National Security Agency has tested the use of smartphone-swipe recognition technology dubbed Mandrake. The NSA has developed a new technology, dubbed “Mandrake“, that can identify users from the way they swipe strokes and text on a smartphone screen. The news was reported by officials with Lockheed […]
A bug affecting the Messages app allows a string of characters sent to a person via iMessage or SMS to crash an iPhone and cause the Messages app to crash A bug in the Apple iOS can cause the Messages app crash and iPhones automatically reboot when they receive a specific crafted text message. The […]
Experts at ESET have discovered over 30 scareware uploaded to the Google Play store over nine months masquerading as Minecraft cheats and tip guides. Do you completely trust mobile applications available on the official app store like Google Play? If your answer is yes, you’re wrong. ESET security researcher Lukas Stefanko has discovered 30 malicious apps uploaded […]
Two security researchers demonstrated that the Android Factory Reset process fails to wipe private data from Android mobile devices. Researchers at Cambridge University, Laurent Simon and Ross Anderson, revealed that more than half a billion Android devices could have data recovered due to flaws in the default wiping process. The experts have analyzed Android 21 devices […]
A new top-secret document leaked by Snowden revealed how the NSA and its allies planned to target Android platforms under the project IRRITANT HORN. New top-secret documents leaked by the whistleblower Edward Snowden revealed that the NSA and its allies of the Five Eyes group (United States, United Kingdom, Canada, New Zealand and Australia) planned to hijack […]
Recently e-mails, text messages, payments, locations, and other data related with mSpy users were posted on the Deep Web, thousand of kids are at risk. Last week, e-mails, text messages, payments, locations, and other data related with mSpy users were posted on the Deep Web. mSpy, is a software-as-a-service product that officially was designed to […]
Hackers steal money from Starbucks mobile customers using linked credit cards, nearly 16 million customers who use the company app are at risk. Starbucks is the last victim of scammers, cyber criminals are syphoning money from the credit or debit card linked to the customers’ Starbucks accounts. The attack is quite simple for fraudsters, the criminal […]
Canadian mobile users were targeted by the latest variant of the Koler Android mobile ransomware after visiting websites proposing adult content. Once again, visitors of websites proposing adult content are targeted by cyber criminals. Last week a malvertising campaign hit visitors of the adult website XHamster, now Canadian Internet users victims were targeted by a […]
Security researchers at FireEye have discovered a vulnerability in the Samsung Galaxy S5 that allows hackers to clone fingerprints. Samsung Galaxy S5 and other âunnamed Android devicesâ could leak user fingerprints to hackers that can clone them. According to security experts at FireEye, although Samsung implements encryption mechanism to protect user fingerprints archived on the mobile […]