mobile

Billion devices could be controlled with built-in management tools by hackers

Security researchers have discovered that billions mobile devices could be remotely controlled due the presence of a built-in management tool.…

11 years ago

Millions of Android devices exposed to fake ID flaw

Android devices are affected by a critical vulnerability which allows a malicious app to impersonate a trusted application inheriting its…

11 years ago

Kaspersky uncovered the complex infrastructure of Koler ransomware

Researchers at Kaspersky Lab issued a report on the Koler ransomware, which is targeting both Android devices and desktop browsers.…

11 years ago

Hacked BigBoss, the biggest Cydia’s repository

The BigBoss app repository, the default package store for Cydia application, has been hacked by a group of hackers which…

11 years ago

WhatsApp profile picture: a risky feature? In the mind of a hacker

In this post I'll show you how an apparently insignificant information on Whatsapp could be used by hackers in a…

11 years ago

Facebook SDK flaw exposes smartphone users’ accounts at risk

Experts from MetaIntell have discovered a critical vulnerability in the latest version of Facebook SDK which exposes millions of Facebook…

11 years ago

Selfmite, the rare Android worm which spreads itself by sending SMS

Experts at AdaptiveMobile discovered a rare Android SMS worm dubbed Selfmite which spreads itself by sending SMS including a malicious…

11 years ago

Android 4.3 and Earlier affected by Critical Code-Execution Flaw

A serious code-execution vulnerability in Android 4.3 and earlier was patched with latest KitKat Android Operating System version. Are you…

11 years ago

Phishing goes mobile with cloned banking app into Google Play

Security experts at Lookout mobile security discovered a phishing campaign against an Israeli bank based which exploited a cloned mobile application.…

11 years ago

PayPal two-factor authentication for mobile apps is flawed

Security experts at Duo Security have discovered a serious flaw in the implementation of two-factor authentication which allow attackers to…

11 years ago

This website uses cookies.