mobile

Pierluigi Paganini May 12, 2013
Apple decrypts seized iPhones for law enforcement

Apple can “bypass the security software” if it chooses, accoring ATF no law enforcement agency could unlock a defendant’s iPhone except Apple that has created a police waiting list because of high demand. Apple is considered an impregnable fortress, the main functions provided by the iOS operating system and related data are inaccessible to ill-intentioned but […]

Pierluigi Paganini May 06, 2013
APWG Mobile Financial Fraud report & mobile black market

APWG published the interesting study APWG Mobile Financial Fraud report on the underground marketplace that revealed the explosion of prolific mobile fraud malware market. The APWG Mobile Financial Fraud report resumed The Anti-Phishing Mobile Working Group investigating on the expansion of the black market for mobile malicious code, the study is crucial to understand the evolution of criminal activities […]

Pierluigi Paganini April 25, 2013
Public offer of Zeus FaaS service on social network

Public offer of Zeus FaaS service on Facebook My readers know very well the dynamic of cybercrime enterprise and in particular of the growing interest in monetization malicious codes such as malware, ransomware and more in general botnets. One of the most targeted sector is banking, the evolution of banking services, their introduction on mobile platforms made attractive targets for cyber criminals, one […]

Pierluigi Paganini April 25, 2013
Critical vulnerability in Viber exposes mobile user to serious risks

Critical vulnerability in Viber allow bypass security mechanisms We have discussed in various occasions of security in mobile environments, mobile device are becoming the center of our digital life, they act as a bridge between our daily existence and our identity in cyberspace. Mobile follows our movements, knows our habits and maintains a history of our interaction with our contacts, it’s clear that  compromising them […]

Pierluigi Paganini April 22, 2013
HTTP-Botnets: The Dark Side of a Standard Protocol!

When the HTTP protocol was born in 1999, no one ever thought it will be used by one of the most dangerous Cyber threats called Botnet. A bot is an application that can perform and repeat a particular task faster than a human. When a large number of bots infect different targets (e.g. Computers and […]

Pierluigi Paganini April 02, 2013
Hacktive Security discoveries flaw in Ruzzle protocol that menaces user’s privacy

Researchers at Hacktive Security, an independent security consulting company, have demonstrated how much insidious could be a so a simple and crimeless large scale application. We are in the digital era, everything is connected to the large networks and applications benefit of even more complex devices that deeply interact with the owner, in this scenario […]

Pierluigi Paganini March 23, 2013
T-Mobile MITM, a starting point to discuss mobile security

Many times we discussed about large diffusion of mobile devices and of related cyber threats, around a months ago I presented the case of HTC mobile that revealed 18 million devices commercialized by Taiwanese company had security flaws that could exposes users to serious risks, in particular the bugs could allow the theft of information […]

Pierluigi Paganini March 20, 2013
FinFisher found everywhere, more complexity and ready for mobile

Many times we discussed about the fact that FinFisher was discovered in the wild, the use of popular spyware has been abused by governments and intelligence agencies all around the world. The spyware is for law enforcement and government use, but it seems to be  preferred for those regimes that desire to monitor representatives of the […]

Pierluigi Paganini March 18, 2013
ReVuln – gaming platforms as vector of cyber attack

The excellent researchers at ReVuln, Luigi Auriemma and Donato Ferrante, presented at Black Hat Europe 2013 in Amsterdam a way to convert local bugs and features in remotely exploitable security vulnerabilities by using the popular EA Origin 3 platform as an attack vector against remote systems. EA Origin is one of the biggest gaming related digital […]

Pierluigi Paganini March 11, 2013
The malicious mobile marketplace explained by Group-IB

Recently many security portals, including Security Affairs, have presented analysis on underground markets and the increased demand of malware and exploit tools. In this post I desire to propose to readers the results of investigation made by researchers at Group-IB, a security firm resident of the Moscow-based Skolkovo Foundation. Mobile malware black market is not well […]