A new interesting report published by The Intercept details the effort spent by the US intelligence to compromise the security of Apple devices. The Intercept published another disconcerting post on the US Intelligence campaign aimed to steal the secrets of the IT giant Apple. According to top-secret documents disclosed by The Intercept a team of researchers working with the Central […]
The security firm Bluebox discovered a preinstalled malware, many malicious apps, and a series of security holes on the Xiaomi Mi 4 smartphone. After the episode of Lenovo pre-installed malware, another case is worrying the IT community. This time, security firm Bluebox has discovered pre-installed malware and other security issues with a Xiaomi Mi 4 mobile […]
The Singapore-based company AdNear is using a fleet of commercial drones to determine users’ location and deliver hyper-targeted ads. Drones that spy on unaware people, a nightmare come true, apparently nothing new considering that it is a common practice of law enforcement and Intelligence agency. The bad news is that also a few advertising companies are also […]
The giant Uber announced a data breach that resulted in unauthorized access to the driver partner license numbers of roughly 50,000 of its drivers. Are you a user of the Uber service? There is a bad news for you! Uber also enters the long list of companies who are victims of a data breach. On Friday, […]
FireEye released a report containing the results of a comprehensive Mobile Threat Assessment of 7 Million iOS and Android Apps. According to U.S. firm FireEye, more than five billion downloaded Android apps are vulnerable to cyber attacks due to the presence of security vulnerabilities in the Android OS. Researchers at FireEye analyzed more than 7 million […]
The McAfee Labs Threat Report: February 2015 analyzes security level of mobile apps and the evolution of principal cyber threats. Last year the Carnegie Mellon University’s Computer Emergency Response Team (CERT) analyzed the level of security implemented by Android applications, in particular the experts focused their investigation on Android applications that failed to properly validate SSL certificates. The […]
A group of researchers has proposed a new technique dubbed PowerSpy to track mobile users’ location by analyzing data related to the power supply. A group of researchers at Stanford University and the Israeli defense company Rafael has discovered a way to track mobile devices by analyzing the power supply. The experts have proposed a technique […]
Telephone DDoS attacks are on the rise, the criminal group known as “TNT” gang has released a new hardware tool in the underground ecosystem. The IntelCrawler cyber threat intelligence company has discovered a new advanced tool, dubbed ‘TNT Instant Up’, for Telephone Denial of Service attacks (TDoS). TDoS is a common practice in the criminal underground, it consists in flooding […]
US and British intelligence services have stolen encryption keys of the major SIM card maker Gemalto to spy on mobile voice and data communications worldwide. A new report published by The Intercept reveals that the National Security Agency and the British counterpart GCHQ obtained encryption keys of the global SIM manufacturer Gemalto, but the company […]
Security researchers at AVG have discovered a new Android malware dubbed PowerOffHijack, which spies on users even when mobile is switched off. Security researchers at AVG have discovered a new strain of Android malware which is able to spy on mobile users even when their mobile is off. The malware could be used to control victim’s […]