Mobile

Pierluigi Paganini November 03, 2014
A security audit reveals that TextSecure app is vulnerable to Unknown Key-Share Attack

A group of researcher that audited the popular TextSecure Private Messenger app discovered that it is vulnerable to Unknown Key-Share attacks. The documents disclosed by Eduard Snowden on surveillance activities has caused a spike in the demand of privacy tools and solutions like the TextSecure Private Messenger app that we sill discuss in this post. TextSecure is a […]

Pierluigi Paganini November 02, 2014
Google Drive once again exploited in a sophisticated phishing attack

Cybercriminals and states-sponsored hackers are leveraging Google Drive site and other cloud storage to operate in a stealthy way and avoid detection. Cybercriminals and attackers are exploiting once again Google Drive infrastructure to avoid detection. The exploitation of Google Drive cloud storage by cyber criminals is not a novelty, a few days ago experts at […]

Pierluigi Paganini October 29, 2014
Sony Xperia Smartphones send user data in China

Security experts have discovered that Sony Xperia Smartphones secretly send user Data to servers in China due to the presence of the Baidu spyware. Sony Xperia Devices secretly send user data to servers in China, this is the last news that is shocking the mobile industry and that was published on several forums. The problem relates to Sony […]

Pierluigi Paganini October 29, 2014
APT28: FireEye uncovered a Russian cyber espionage campaign

APT28: FireEye has issued a new report uncovering a large scale cyber-espionage campaign that appears sponsored by the Russian government. A report published by FireEye reveals that a group of Russian hackers, dubbed APT28, is behind long-running cyber espionage campaigns that targeted US defense contractors, European security organizations and Eastern European government entities. The hackers also targeted attendees of European defense […]

Pierluigi Paganini October 28, 2014
Verizon Wireless tracks its clients with the UIDH technology

Verizon Wireless injects UIDH headers to every user’s Web request to track its web experience including visited websites and his habits. Verizon Wireless, the greatest US Telecom operator is tracking the internet traffic of its mobile users by adding a token to Web requests. The token is used by the company for advertising purpose, Verizon tracks the user’s habits, even if he had opted out […]

Pierluigi Paganini October 26, 2014
NIST warns on Zero-Day flaw in Samsung FindMyMobile

The National Institute of Standards and Technology is warning of the presence of a Zero-Day flaw in the Samsung FindMyMobile service. The US-CERT/NIST is warning of the presence of a zero-day flaw that affects the Samsung FindMyMobile web service (CVE-2014-8346). The Samsung FindMyMobile implements several features that allow users to locate the lost device, to play an […]

Pierluigi Paganini October 26, 2014
Koler Android Ransomware spread itself via SMS messages

The security firm AdaptiveMobile has discovered a new variant of Koler ransomware is capable of self-replication via SMS messages. A new strain of the Koler Android ransomware is threatening the mobile industry, the new variant spreads itself via SMSs and holds the victim’s device phone hostage until a ransom is paid. The Koler ransomware were detected by experts […]

Pierluigi Paganini October 25, 2014
Pangu Jailbreak Tool available for iOS 8 and iOS 8_1

The Chinese jailbreaking team Pangu has just released a software that allows Apple users to jailbreak their mobile devices using  iOS 8 and iOS 8.1 The Jailbreak for the new iOS 8.1 is available on the Internets, The Chinese jailbreaking team Pangu has just released an application that allows Apple users to jailbreak their mobile devices, including iPhones, […]

Pierluigi Paganini October 21, 2014
Hiding a malicious Android APK in images as evasion method

Two researchers at Fortinet have demonstrated during the last Black Hat Europe conference how to hide a malicious Android APK in images. Mobile devices are continuously under attacks, cyber criminals are improving their technique to attack mobile users and increase the profits.  A new technique recently disclosed, allows attackers to hide encrypted malicious Android applications inside […]

Pierluigi Paganini October 15, 2014
Millions Android Cyanogenmod users exposed to MitM attacks due to Code re-use

Researcher explains that vulnerable code re-use of zero-day in Android’s CyanogenMod exposes million users to Man-In-The-Middle attacks. Security experts always discourage jailbreaking and rooting of mobile devices due to the risk related to the installation of not authorized applications that could hide malware and serious bugs. At the Ruxcon Security Conference in Australia, an unnamed security […]