mobile

Android’s Vampire Bat Apps are listening to your life through ultrasonic beacons

Researchers at Technische Universitat Braunschweig published a study on 200+ Android mobile apps that are listening to your life through…

9 years ago

Poorly designed apps leave millions of phones at risk of open port attack

Security experts demonstrated that insecure mobile applications leave millions of smartphones at risk of open port attack. A group of…

9 years ago

Security vulnerabilities in Hyundai Blue Link mobile app allowed hackers to steal vehicles

Security vulnerabilities in the Hyundai Blue Link mobile apps allowed hackers to steal vehicles, the car maker fixed them. Security…

9 years ago

Fake app hiding a SMSVova spyware went undetected for years in the Google Play Stores

Millions of users looking to get software updates have downloaded an app hiding a spyware called SMSVova through the official…

9 years ago

Hackers can steal PINs and Passwords capturing data from smartphone sensors

A group of researchers has demonstrated that attackers can steal PINs and Passwords capturing data from smartphone sensors. Modern mobile…

9 years ago

Millions of mobile phones and laptops potentially exposed to attack leveraging baseband zero-days

The researcher Ralf Weinmann revealed that millions of mobile phones and laptops are potentially exposed to attack leveraging baseband zero-days he…

9 years ago

Vulnerability in Apple Music for Android could be exploited to steal user data

Apple fixed a vulnerability tracked as CVE-2017-2387 in the Apple Music for Android that could allow attackers to launch MitM…

9 years ago

Android Chrysaor spyware went undetected for years

Chrysaor spyware is an Android surveillance malware that remained undetected for at least three years, NSO Group Technology is suspected…

9 years ago

Samsung Galaxy S8 facial recognition system to unlock the device can be bypassed with a photo

Users can unlock Samsung Galaxy S8 phone by holding their Samsung Galaxy S8 in front of their eyes or their…

9 years ago

Rogue Cellphone towers used to spread the Android Swearing Trojan

Chinese scammers are deploying rogue cellphone towers to spread the Android Swearing Trojan via malicious URL in SMS messages. Chinese…

9 years ago

This website uses cookies.