mobile

BlackBerry 10 affected by a remote code execution vulnerability

BlackBerry issued an alert on a remote code execution vulnerability in qconnDoor service that affects BlackBerry 10 smartphones. A recent…

12 years ago

Israeli students can cause fake traffic jams on popular Waze map app

Two Israeli students at Technion-Israel Institute of Technology were able to cause traffic jams hacking the popular navigation app Waze…

12 years ago

New iOS 7 bug allows anyone to disable Find My iPhone feature

A new iOS 7 bug allows anyone to disable Find My iPhone feature and to bypass Activation Lock without user's…

12 years ago

Android Oldboot B, the most dangerous and complex bootkit of ever

Chinese researchers from "360 Mobile Security" detected Android Oldboot.B malware, until today the most complex bootkit which infected millions of…

12 years ago

Chinese CCTV reported cases of pre-installed malware on Android mobile

Chinese TV station, CCTV, has reported some cases where smartphone were compromised by pre-installed malware before selling them on to unwitting…

12 years ago

Coinkrypt Android malware used to mine digital currencies

Experts at Lookout Mobile Security have discovered that cyber criminals are spreading Coinkrypt malware to use victim's mobile to mine…

12 years ago

How to rob ATMs with a couple of SMS messages

Symantec experts demonstrated how to rob ATMs using a mobile device and sending a couple of SMS. Cybercriminals are increasing…

12 years ago

Pileup flaws in Android PMS menace more than 1 Billion devices

A group of researchers discovered a series of 6 vulnerabilities, dubbed Pileup flaws, in Android PMS that exposes more than…

12 years ago

Tor browser app in the Apple app store is fake

For more than two months is is present in the official App Store a fake version of the Tor Browser…

12 years ago

Fraudulent infrastructure behind 5M harvested Russian phone numbers service

Danchev profiling a service which proposes more than 5M harvested mobile phone numbers has discovered a fraudulent architecture used for…

12 years ago

This website uses cookies.