mobile

Android Security Bulletin—November 2017 – Google addresses critical flaws and high-risk KRACK vulnerabilities in Android

Android Security Bulletin—November 2017 - Google addresses critical vulnerabilities and high-risk KRACK flaws in Android OS. Google released the Android…

8 years ago

White hat hackers earn over $500,000 for mobile exploits at Mobile Pwn2Own 2017 competition

Let's see what has happened at Mobile Pwn2Own 2017 competition organized by Trend Micro’s Zero Day Initiative (ZDI) at the PacSec…

8 years ago

AhMyth Android RAT, another open source Android RAT Tool available on GitHub

The source code of a new Android Remote Administration Tool is available on GitHub, it is dubbed AhMyth Android RAT. You just…

8 years ago

DoubleLocker, the Android Ransomware that encrypts files and changes PIN Lock

Crooks have developed a strain of Android ransomware dubbed Doublelocker that both encrypts user data and changes PIN Lock. DoubleLocker,…

8 years ago

Which are most frequently blacklisted apps by enterprises?

Mobile security firm Appthority published an interesting report that revealed which Android and iOS applications are most frequently blacklisted by…

8 years ago

Signal announces private contact discovery to improve users’privacy

Open Whisper Systems announced that it’s working on a new private contact discovery service for its popular communications app Signal.…

8 years ago

iOS apps can access metadata revealing users’ locations and much more

Developer discovered that iOS apps can read metadata revealing users' locations and much more, a serious threat to our privacy.…

8 years ago

Google publishes PoC Exploit code for iPhone Wi-Fi Chip hack

Google disclosed details and a proof-of-concept exploit for iPhone Wi-Fi firmware vulnerability affecting Broadcom chipsets in iOS 10 and earlier.…

8 years ago

New Android Banking Trojan Red Alert 2.0 available for sale on crime forums

Researchers discovered a new Android banking Trojan, dubbed Red Alert 2.0, that is being offered for rent on many dark websites…

8 years ago

Researchers demonstrate how to steal Bitcoin by exploiting SS7 issues

Hackers have exploited security weaknesses in SS7 protocol to break into a GMail account, take control of a bitcoin wallet…

8 years ago

This website uses cookies.