A group of researcher that audited the popular TextSecure Private Messenger app discovered that it is vulnerable to Unknown Key-Share attacks. The documents disclosed by Eduard Snowden on surveillance activities has caused a spike in the demand of privacy tools and solutions like the TextSecure Private Messenger app that we sill discuss in this post. TextSecure is a […]
Cybercriminals and states-sponsored hackers are leveraging Google Drive site and other cloud storage to operate in a stealthy way and avoid detection. Cybercriminals and attackers are exploiting once again Google Drive infrastructure to avoid detection. The exploitation of Google Drive cloud storage by cyber criminals is not a novelty, a few days ago experts at […]
Security experts have discovered that Sony Xperia Smartphones secretly send user Data to servers in China due to the presence of the Baidu spyware. Sony Xperia Devices secretly send user data to servers in China, this is the last news that is shocking the mobile industry and that was published on several forums. The problem relates to Sony […]
APT28: FireEye has issued a new report uncovering a large scale cyber-espionage campaign that appears sponsored by the Russian government. A report published by FireEye reveals that a group of Russian hackers, dubbed APT28, is behind long-running cyber espionage campaigns that targeted US defense contractors, European security organizations and Eastern European government entities. The hackers also targeted attendees of European defense […]
Verizon Wireless injects UIDH headers to every user’s Web request to track its web experience including visited websites and his habits. Verizon Wireless, the greatest US Telecom operator is tracking the internet traffic of its mobile users by adding a token to Web requests. The token is used by the company for advertising purpose, Verizon tracks the user’s habits, even if he had opted out […]
The National Institute of Standards and Technology is warning of the presence of a Zero-Day flaw in the Samsung FindMyMobile service. The US-CERT/NIST is warning of the presence of a zero-day flaw that affects the Samsung FindMyMobile web service (CVE-2014-8346). The Samsung FindMyMobile implements several features that allow users to locate the lost device, to play an […]
The security firm AdaptiveMobile has discovered a new variant of Koler ransomware is capable of self-replication via SMS messages. A new strain of the Koler Android ransomware is threatening the mobile industry, the new variant spreads itself via SMSs and holds the victim’s device phone hostage until a ransom is paid. The Koler ransomware were detected by experts […]
The Chinese jailbreaking team Pangu has just released a software that allows Apple users to jailbreak their mobile devices using iOS 8 and iOS 8.1 The Jailbreak for the new iOS 8.1 is available on the Internets, The Chinese jailbreaking team Pangu has just released an application that allows Apple users to jailbreak their mobile devices, including iPhones, […]
Two researchers at Fortinet have demonstrated during the last Black Hat Europe conference how to hide a malicious Android APK in images. Mobile devices are continuously under attacks, cyber criminals are improving their technique to attack mobile users and increase the profits. A new technique recently disclosed, allows attackers to hide encrypted malicious Android applications inside […]
Researcher explains that vulnerable code re-use of zero-day in Android’s CyanogenMod exposes million users to Man-In-The-Middle attacks. Security experts always discourage jailbreaking and rooting of mobile devices due to the risk related to the installation of not authorized applications that could hide malware and serious bugs. At the Ruxcon Security Conference in Australia, an unnamed security […]