mobile

Pierluigi Paganini October 06, 2015
The Smurf Suite – GCHQ can hack your phone with a text message

Snowden told the BBC’s Panorama that the GCHQ has developed a hacking suite dubbed Smurf Suite, it can hack any mobile by sending an encrypted text message. There is no way to stop secret services spying on users’ Smartphones, this is the last revelation of the US whistleblower Edward Snowden. Snowden told the BBC’s Panorama that the […]

Pierluigi Paganini October 05, 2015
YiSpecter iOS Malware can infect any Apple iOS device

Experts at Paloalto Networks discovered a strain of Apple iOS malware dubbed YiSpecter that is able to infect both jailbroken and non-jailbroken devices. The recent XCodeGhost attack suffered by Apple demonstrated that nobody is completely secure from malware-based attacks. Now security researchers at PaloAlto Networks have discovered a new malware dubbed YiSpecter that they sustain is able to […]

Pierluigi Paganini October 04, 2015
Bogus PayPal App used to spread a banking Trojan

Security experts at Trend Micro have uncovered a spam campaign spreading a bogus PayPal app to steal German users’ banking credentials. A spam campaign is targeting German Andoird users, the malicious emails impersonate PayPal trying to trick the recipient into downloading a bogus PayPal app update that hides a banking Trojan. “Mobile banking is now used by […]

Pierluigi Paganini October 02, 2015
A billion Android devices vulnerable to Stagefright 2.0 bugs

A billion Android phones are vulnerable to Stagefright 2.0 flaws that could be exploited by attackers to execute malicious code on the targeted device. Do you remember the Stagefright vulnerability? In July 2015,  security experts from Zimperium discovered the Stagefright flaw in the popular Google Android OS which allows hackers to gain control of the system without raising […]

Pierluigi Paganini September 16, 2015
Unlock Android 5.x devices is very easy

The security researcher John Gordon has found an easy way to unlock smartphones running Android 5.0 and 5.1 (Build LMY48M). The security researcher John Gordon has discovered a very simple way to bypass the mobile lock feature implemented on smartphones running Android 5.0 and 5.1 (Build LMY48M). Mechanisms like Password lock, Pattern lock and PIN lock […]

Pierluigi Paganini September 12, 2015
Zimperium firm released the Android Stagefright Exploit Code

Zimperium firm released the Android Stagefright Exploit Code, the Android flaw that is threatening the users of the popular Google mobile OS. Experts at Zimperium Mobile Security Labs (zLabs) recently discovered a critical flaw, dubbed Stagefright affecting the Android OS. The experts revealed that the Stagefright flaw (CVE-2015-1538) potentially affects 95% of Android devices running version 2.2 to 5.1 of […]

Pierluigi Paganini September 08, 2015
vCard flaw exposes up to 200 million of WhatsApp Web users

Security experts at Check Point security discovered a flaw in WhatsApp Web that could be exploited by attackers to compromise hundreds of millions users, According to the security firm Check Point a vulnerability in the popular messaging service WhatsApp Web exposes up to 200 million of its users at risk of cyber attack. WhatsApp Web allows […]

Pierluigi Paganini September 06, 2015
DoJ defines new rules for spying with the Stingray technology

The US Justice Department issued guidelines for StingRay Surveillance devices, new rules define aim to ensure privacy protection and transparency. Do you know what is a StingRay? If you want further details give a look to a post I wrote for the Infosec Institute on the StingRay Technology: “StingRay is an IMSI-catcher (International Mobile Subscriber […]

Pierluigi Paganini September 04, 2015
New singular Android Ransomware relies on the XMPP protocol

A new variant of Android ransomware relies on the instant messaging protocol XMPP to establish a communication with C&C servers. According to security researchers at Check Point Software Technologies a new Android ransomware disguised as a video player app implements a method of communication different from any other similar threat. This Android ransomware is different from […]

Pierluigi Paganini September 03, 2015
Company’s data at risk due to the use of mobile gambling apps

Veracode has conducted a research on the security of several mobile gambling apps and discovered a number of flaws that expose enterprises to serious risks. If you belong to a global corporation, the most probably think you will find out is that some of your colleagues have installed mobile apps that don’t belong to the […]