mobile

SurfingAttack – hacking phones via ultrasonic wavesSurfingAttack – hacking phones via ultrasonic waves

SurfingAttack – hacking phones via ultrasonic waves

SurfingAttack is an attacking technique that allows to wake up mobile device and control them using voice commands encoded in…

5 years ago
Which are the most dangerous mobile app stores online?Which are the most dangerous mobile app stores online?

Which are the most dangerous mobile app stores online?

An interesting report published by RiskIQ on 2019 Mobile App Threat Landscape, lists the most dangerous mobile app store online.…

5 years ago
European Commission has chosen the Signal app to secure its communicationsEuropean Commission has chosen the Signal app to secure its communications

European Commission has chosen the Signal app to secure its communications

The popular cross-platform encrypted messaging service Signal has been chosen by the European Commission for its communications. The European Commission…

5 years ago
Google Play Protect prevented 1.9 billion malware installs from Third-party stores in 2019Google Play Protect prevented 1.9 billion malware installs from Third-party stores in 2019

Google Play Protect prevented 1.9 billion malware installs from Third-party stores in 2019

Google Play Protect now scans over 100 billion applications on Android devices every day, these amazing figures were disclosed by…

5 years ago
Using 99 mobile phones to create a fake traffic jam in Google MapsUsing 99 mobile phones to create a fake traffic jam in Google Maps

Using 99 mobile phones to create a fake traffic jam in Google Maps

A German artist demonstrated how using a simple trick it is possible to deceive Google Maps and create a virtual…

5 years ago
NIST Tests Forensic Methods for Getting Data From Damaged Mobile PhonesNIST Tests Forensic Methods for Getting Data From Damaged Mobile Phones

NIST Tests Forensic Methods for Getting Data From Damaged Mobile Phones

Crooks sometimes damage their mobile devices to destroy evidence, NIST tests forensic methods for getting data from damaged mobile phones…

5 years ago
Jeff Bezos phone was hacked by Saudi crown princeJeff Bezos phone was hacked by Saudi crown prince

Jeff Bezos phone was hacked by Saudi crown prince

The phone of the Amazon billionaire Jeff Bezos was hacked in 2018 after receiving a WhatsApp message from the personal…

5 years ago
Security flaws allowed hijacking any TikTok accountSecurity flaws allowed hijacking any TikTok account

Security flaws allowed hijacking any TikTok account

A flaw in the popular TikTok app could allow attackers to hijack any user account just by knowing the mobile…

6 years ago
A flaw in Twitter App for Android could have been exploited to take over the accountA flaw in Twitter App for Android could have been exploited to take over the account

A flaw in Twitter App for Android could have been exploited to take over the account

A flaw in the Twitter app for Android could have been exploited by attackers to obtain sensitive information or take…

6 years ago
NYT report states that ToTok app is a government spy tool.NYT report states that ToTok app is a government spy tool.

NYT report states that ToTok app is a government spy tool.

A popular mobile app in the Middle East called ToTok has been removed from both Apple and Google's online stores…

6 years ago