Researchers at FireEye have developed a POC that exploits an Apple vulnerability to implement a Background Monitoring on Non-Jailbroken iOS…
Apple released a security update to iOS that restores some certificate-validation checks that had apparently been missing for an unspecified…
Experts at Praetorian have been conducting the Project Neptune to assess the security for designing and maintenance of mobile apps,…
Rapid 7 has released the "exploit/android/browser/webview_addjavascriptinterface" module which allows attackers to remotely access on most Android devices. A bug in…
The hardware hacker Bunnie Huang presented at the Chaos Compute Club Congress how to exploit SD cards microcontrolled for malicious…
Many times we discussed about large diffusion of mobile devices and of related cyber threats, around a months ago I…
WebSense has just released 2013 Threat Report, an interesting analysis of cyber threats based on data collected by the Websense…
The charge is heavy, according to some experts, Nokia analyzes user’s traffic officially to increase performance compressing data on some…
It’s the news of the day, a fraudulent digital certificate that could be used for active phishing attacks against Google’s…
Money motivates the cyber assault to banking by cybercrime, but the finance world is also considered a privileged target for…
This website uses cookies.