Experts discovered pre-installed malware on 38 high-end smartphone models belonging to popular manufacturing companies such as Samsung, LG, Xiaomi and Asus. In the past, security experts have already reported cases of pre-installed malware on mobile devices. In September 2015, security experts at G-Data security firm discovered new cases of Chinese Android mobile devices infected by […]
Motherboard published an interesting blog post which includes further details on the cost of StingRay phone surveillance equipment. A couple of years ago I published a post on Stingray Technology trying to explain how governments track cellular devices. A StingRay is an IMSI-catcher (International Mobile Subscriber Identity) designed and commercialized by the Harris Corporation. At the time of the […]
PaloAlto and with WeipTech have identified 92 samples of a new iOS malware family in the wild dubbed KeyRaider that compromised over 225,000 Apple accounts. Palo Alto networks announced recently that a new iOS malware called KeyRaider allowed crooks to take over more than 225.000 apple accounts on jailbroken iOS devices. KeyRaider allows the attackers […]
Within the year of 2014, a lot of data was leaked and this leads to grave concerns as to the future of overall online security. Unfortunately, 2014 was one of the worst years and the reason of that was that a lot if viruses and attempts of violation of online privacy. IBM X-Force Threat Intelligence […]
Experts at Praetorian have been conducting the Project Neptune to assess the security for designing and maintenance of mobile apps, including WhatsApp. This week the IT was shocked by the acquisition of WhatsApp by Facebook, the popular mobile messaging service was sold for $19 billion, probably this is the value assigned to the information managed by […]
Mobile devices security – Lookout proposed an interesting analysis for the mobile threats observed during 2013, specifically for adware and chargeware. Mobile is probably one of most pervasive technology, during 2013 for the first time we saw the overcoming in the number of mobile devices over those desktops in some countries, the downside is that the […]
An Israeli security researcher from the Ben-Gurion University of the Negev’s Cyber Security Labs has discovered a serious security flaw in Samsung Knox. Samsung Knox is affected by a serious flaw, the discovery was made by an Israeli security researcher, Mordechai Guri, from the Ben-Gurion University of the Negev’s Cyber Security Labs. Samsung Knox is […]
The use of mobile devices in government environments concerns the secret service of any states, cyber espionage more often exploits the mobile platforms. Mobile devices are reason of great concern for governments, they have a great computational capability, huge memories to store our personal data, GPS to follow our movements and are equipped with a […]
Bluebox Labs recently discovered an Android vulnerability in the OS’s security model that allows hackers to attack 99% of Android devices on the market. Android vulnerability allows app modification preserving signatures … this is the shocking discovery announced by Bluebox Labs. During this week we have had the opportunity to discuss about mobile botnets and […]
Apple can “bypass the security software” if it chooses, accoring ATF no law enforcement agency could unlock a defendant’s iPhone except Apple that has created a police waiting list because of high demand. Apple is considered an impregnable fortress, the main functions provided by the iOS operating system and related data are inaccessible to ill-intentioned but […]