Mobile

Pierluigi Paganini November 20, 2014
A new critical flaw affects Android OS except Lollipop

The security researcher Jann Horn discovered a privilege escalation flaw that affects Android OS devices except the Lollipop version. A critical vulnerability affects the Android OS versions prior to 5.0 that could be exploited by an attacker to bypass ASLR and run arbitrary code on a target device under specific conditions. The vulnerability was fixed in the latest version of […]

Pierluigi Paganini November 18, 2014
WhatsApp implements encryption by default on Android OS

WhatsApp implemented the encryption by default on Android OS with the collaboration of the Open Whisper company. Soon it will be extended to other platforms. Many time security community has discussed about security of the popular messaging application WhatsApp, early 2014 experts at Praetorian discovered different security issues in the way WhatApp implements SSL, the principal one is the […]

Pierluigi Paganini November 18, 2014
The latest Windows Phone 8.1 has been hacked

Operators of the XDA-developers forum explained how it is possible to hack Windows Phone 8.1 to run any app package in any Program directory. XDA-developers have discovered a new vulnerability in latest Microsoft OS Windows Phone 8.1 that could easily be exploited by attackers to compromise a Nokia Lumia phone running it. The XDA Developers member […]

Pierluigi Paganini November 11, 2014
Masque Attack – every iOS app could be compromised

Researchers at FireEye identified a new attack dubbed the Masque, which allows attackers to replace a genuine app with a malicious one. In these days Apple the community has discovered that is vulnerable to WireLurker, a new strain of malware that is able to infect Apple iPhone and iPad syphoning user’data. The malware was discovered for the […]

Pierluigi Paganini November 09, 2014
WireLurker malware is threatening Apple mobile devices

Security Experts at Palo Alto Networks have discovered a new variant of malware dubbed WireLurker that is infecting Apple mobile devices. A new strain of malware dubbed WireLurker  is threatening Apple users, the malicious code is able to infect Apple iPhone and iPad syphoning user’data. The malware was discovered for the first time by experts […]

Pierluigi Paganini November 03, 2014
A security audit reveals that TextSecure app is vulnerable to Unknown Key-Share Attack

A group of researcher that audited the popular TextSecure Private Messenger app discovered that it is vulnerable to Unknown Key-Share attacks. The documents disclosed by Eduard Snowden on surveillance activities has caused a spike in the demand of privacy tools and solutions like the TextSecure Private Messenger app that we sill discuss in this post. TextSecure is a […]

Pierluigi Paganini November 02, 2014
Google Drive once again exploited in a sophisticated phishing attack

Cybercriminals and states-sponsored hackers are leveraging Google Drive site and other cloud storage to operate in a stealthy way and avoid detection. Cybercriminals and attackers are exploiting once again Google Drive infrastructure to avoid detection. The exploitation of Google Drive cloud storage by cyber criminals is not a novelty, a few days ago experts at […]

Pierluigi Paganini October 29, 2014
Sony Xperia Smartphones send user data in China

Security experts have discovered that Sony Xperia Smartphones secretly send user Data to servers in China due to the presence of the Baidu spyware. Sony Xperia Devices secretly send user data to servers in China, this is the last news that is shocking the mobile industry and that was published on several forums. The problem relates to Sony […]

Pierluigi Paganini October 29, 2014
APT28: FireEye uncovered a Russian cyber espionage campaign

APT28: FireEye has issued a new report uncovering a large scale cyber-espionage campaign that appears sponsored by the Russian government. A report published by FireEye reveals that a group of Russian hackers, dubbed APT28, is behind long-running cyber espionage campaigns that targeted US defense contractors, European security organizations and Eastern European government entities. The hackers also targeted attendees of European defense […]

Pierluigi Paganini October 28, 2014
Verizon Wireless tracks its clients with the UIDH technology

Verizon Wireless injects UIDH headers to every user’s Web request to track its web experience including visited websites and his habits. Verizon Wireless, the greatest US Telecom operator is tracking the internet traffic of its mobile users by adding a token to Web requests. The token is used by the company for advertising purpose, Verizon tracks the user’s habits, even if he had opted out […]