mobile

Pierluigi Paganini December 31, 2014
Hacking 4G USB modems and SIM Card via SMS

A group of experts managed to uncover USB modem vulnerabilities that allow a potential attacker to gain full control of the connected system. A team of researchers at Positive Technologies conducted a study on how to compromise USB modems and attack SIM cards via SMS over 4G networks at the PacSec and Chaos Computer Club […]

Pierluigi Paganini December 30, 2014
Hackers target Facebook users exploiting Same Origin Policy vulnerability

Security Experts at Trend Micro discovered a series of hacking attacks targeting Facebook users and exploiting the Same Origin Policy vulnerability. A serious security vulnerability affects the default web browser of the Android OS lower than 4.4, according the data provided by Google official dashboard nearly the 66% of Android devices is impacted. The security […]

Pierluigi Paganini December 18, 2014
CoolReaper, a Backdoor in million Coolpad Android devices

Palo Alto Networks discovered that the software installed on many of Coolpad high-end Android phones includes a CoolReaper backdoor. The US security firm Palo Alto Networks have discovered that millions of Android smartphones commercialized by the Chinese smartphone maker Coolpad Group Ltd. may contain a “backdoor”, dubbed CoolReaper, that allows the tracking of the users. Palo Alto […]

Pierluigi Paganini December 15, 2014
Stingray surveillance devices used to spy on the Norwegian Parliament

A newspaper discovers that bad actors are spying on cell phone communications of Norwegian politicians using the StingRay mobile surveillance equipment. The journalists of a daily newspaper in Norway have discovered a mobile phone surveillance equipment hidden around the Government and Parliamentary building and apparently there is no information on who has used it. Everyday we read about cyber […]

Pierluigi Paganini December 15, 2014
GCHQ launches Cryptoy mobile app to teach cryptography

Cryptoy is the free educational app about cryptography designed by GCHQ for use by secondary school students and their teachers. The British Intelligence agency GCHQ has launched “Cryptoy”, an Android mobile app that was designed to encourage youngsters to tackle emerging cyber security threats, the Agency made it available to download today. The Cryptoy mobile app was developed by […]

Pierluigi Paganini December 14, 2014
Android malware used to spread pirated Assassin Creed App

Security experts at Zscaler discovered a pirated version of the Assassin Creed mobile app for Android that was used to spread a malware. Security experts at Zscaler discovered a trojanized and pirated version of the popular Assassin Creed application for Android platform. Assassin Creed is one of the most popular paid video games, available for almost […]

Pierluigi Paganini December 05, 2014
DeathRing, a new Pre-loaded mobile trojan in the wild

The number of Pre-loaded mobile trojan in the wild is increasing, DeathRing is the last one discovered by the experts at Lookout firm. It’s not first the time that Android handsets come preloaded with malware, but cyber security experts are warning of a worrying increase of the cases. The problem is widespread in Asia and Africa, […]

Pierluigi Paganini December 01, 2014
Crashing WhatsApp by sending a specially crafted message

Indian researchers have discovered a flaw in WhatsApp that allows anyone to remotely crash the popular mobile app by sending a specially crafted message. A “nice” vulnerability has been discovered in the popular messaging app WhatsApp that could be exploited by an attacker to remotely crash the mobile app just by sending a specially crafted message. The […]

Pierluigi Paganini November 28, 2014
The Twitter App Graph feature will track users mobile apps for commercial purposes

Twitter announced app graph, it will now track every mobile app its users have Installed on their smartphones and tables.  Privacy advocates arise. Twitter announced the implementation of the “app graph” function that will allow the company to provide “more personal Twitter experience” by serving targeted advertisements by serving targeted advertisements. This means that also Twitter, like […]

Pierluigi Paganini November 25, 2014
Hacking RFID payment smart cards with an Android App

TrendMicro explained the mechanisms behind the hacking of RFID payment smartcards, explained how to do it with an Android App. Security experts recently spotted an Android app used to hack the NFC based electronic payment system used in Chile, the “Tarjeta BIP!”. The malicious Android app detected as ANDROIDOS_STIP.A was designed to attack NFC devices and distributed online through forums and blogs. […]