Bogdan Alecu, a system administrator at Dutch IT services company Levi9, discovered that Google Nexus phones are vulnerable to SMS-based…
A study conducted by company's enterprise security arm HP Fortify revealed that the majority of mobile apps based on iOS…
At last HP's Pwn2Own 2013 contest hacking teams from Japan and China compromised iPhone 5 running iOS 6 and iOS…
TrendLabs has just published the third quarterly report, titled The Invisible Web Unmasked, on the evolution of cybercrime observed in…
The GCHQ (British Government Communications Headquarters) used fake LinkedIn and Slashdot to hack Belgacom, OPEC & others GRX providers. According…
The use of mobile devices in government environments concerns the secret service of any states, cyber espionage more often exploits…
Security expert Jay Freeman discovered another Master Key vulnerability in Android 4.4 that allows attackers to inject malicious code in…
Wi-Fi HTTP Request Hijacking attack against iOS - the researchers at Skycure have demonstrated a new technique that menaces mobile…
The hack of a social media account is a common incident that could have a serious impact of our digital…
LinkedIn launched LinkedIn Intro app for iOS to show LI profiles right inside the native iPhone mail client. Which is…
This website uses cookies.