Mobile

Android devices, from Ice Cream version to Jelly Bean were p0wned with RCSAndroid

Android devices, from Ice Cream version to Jelly Bean were p0wned with RCSAndroid RAT, one of the most professionally developed…

11 years ago

Researcher discloses Local Privilege Escalation Flaw in Apple Mac OS X

Researchers have discovered a critical local privilege escalation (LPE) vulnerability in the Mac OS X operating system, but Apple will…

11 years ago

Security Affairs newsletter Round 18 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…

11 years ago

iOS crash warnings scam targeted iPhone and iPad users in US and UK

According to a report published by The Telegraph, scammers are targeting iPhone and iPad users with a new elaborate scheme…

11 years ago

Bogus News mobile App discovered in Hacking Team arsenal

Experts at Trend Micro have discovered a malicious Android App while they were analyzing the package of data stolen from…

11 years ago

Many Android and Apple Apps allow brute force attacks

According to a recent research published by experts at the AppBugs firm many Android and Apple mobile apps allow brute…

11 years ago

1 Million Android Users were infected by Gaming Apps

Researchers discovered a malicious Android Trojan disguised as gaming app that was served through the official Google Play more than…

11 years ago

Security Affairs newsletter Round 17 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…

11 years ago

GDATA on Android malware. 4,900 new strains discovered every day

Every 18 seconds a new mobile Android malware is discovered in the wild as reported in the G DATA Malware…

11 years ago

Apple issues a fix for Masque Attacks, but apps are still open to hack

Although Apple has fixed the Masque Attack there are still other attack scenarios that an attacker can exploit in the…

11 years ago

This website uses cookies.