mobile

Profiling for underground service harvests mobile phone numbersProfiling for underground service harvests mobile phone numbers

Profiling for underground service harvests mobile phone numbers

Dancho Danchev profiled a new service harvests mobile phone numbers advertised in the underground, the vendor also proposing SMS spamming…

12 years ago
Android vulnerability makes 99% of mobile devices attackableAndroid vulnerability makes 99% of mobile devices attackable

Android vulnerability makes 99% of mobile devices attackable

Bluebox Labs recently discovered an Android vulnerability in the OS's security model that allows hackers to attack 99% of Android…

12 years ago
Android Hack-Tool discovered by F-SecureAndroid Hack-Tool discovered by F-Secure

Android Hack-Tool discovered by F-Secure

Android Hack-Tool discovered by F-Secure confirming that cyber threats targeting Android devices are rapidly growing in quantity and sophistication level.…

12 years ago
US law enforcers suggest a kill switch for mobile and Apple adaptsUS law enforcers suggest a kill switch for mobile and Apple adapts

US law enforcers suggest a kill switch for mobile and Apple adapts

US law enforcers suggest a kill switch for mobile devices to principal manufactures and Apple adapts. The idea of US law…

12 years ago
Kaspersky Lab experts detected most sophisticated Android trojanKaspersky Lab experts detected most sophisticated Android trojan

Kaspersky Lab experts detected most sophisticated Android trojan

Security researchers at Kaspersky Lab detected a new instance of Android trojan, dubbed Obad, that they have judged as the most…

12 years ago
Mobile Threat Report for Q1 2013, the monopoly of Android malwareMobile Threat Report for Q1 2013, the monopoly of Android malware

Mobile Threat Report for Q1 2013, the monopoly of Android malware

F-Secure published the Mobile Threat Report for Q1 2013 that reveals Malware targeting Android devices is rapidly growing in both…

12 years ago
Apple decrypts seized iPhones for law enforcementApple decrypts seized iPhones for law enforcement

Apple decrypts seized iPhones for law enforcement

Apple can "bypass the security software" if it chooses, accoring ATF no law enforcement agency could unlock a defendant's iPhone except…

12 years ago
APWG Mobile Financial Fraud report & mobile black marketAPWG Mobile Financial Fraud report & mobile black market

APWG Mobile Financial Fraud report & mobile black market

APWG published the interesting study APWG Mobile Financial Fraud report on the underground marketplace that revealed the explosion of prolific…

12 years ago
Public offer of Zeus FaaS service on social networkPublic offer of Zeus FaaS service on social network

Public offer of Zeus FaaS service on social network

Public offer of Zeus FaaS service on Facebook My readers know very well the dynamic of cybercrime enterprise and in particular of…

12 years ago
Critical vulnerability in Viber exposes mobile user to serious risksCritical vulnerability in Viber exposes mobile user to serious risks

Critical vulnerability in Viber exposes mobile user to serious risks

Critical vulnerability in Viber allow bypass security mechanisms We have discussed in various occasions of security in mobile environments, mobile device are becoming the center of…

12 years ago