mobile

Mobile cyber threats, from risky apps to black market activity

Mobile is probably technology that is having the greatest growth, an increasing number of users execute any kind of application…

13 years ago

Serious security flaws affect millions of HTC mobile devices

The news of those who make a lot of noise, more than 18 million devices commercialized by Taiwanese company HTC…

13 years ago

Zeus hit five major banks in Japan

Zeus malware is considered the most popular and prolific malicious code for banking, it is one of the privilege agent…

13 years ago

Dissecting a mobile malware

The capillary diffusion of mobile devices, the lack of security systems on these platforms and low level of awareness on…

13 years ago

Bouncer, new phishing variant from RSA

Despite simplicity of the schema phishing attacks have increased exponentially in the last years targeting every sector,both public and private.…

13 years ago

My reading of the “ENISA Threat Landscape” report

The European Network and Information Security Agency (ENISA) is the EU’s agency responsible for cyber security issues of the European…

13 years ago

Hackers, a need for cyber security

Ten years, that is the time interval that has totally changed the worldwide perception for the role of hacker, these…

13 years ago

Hacktivism and web monitoring in 2013 for Security Affairs

The year is ending and it’s very easy to read forecast for next year, experts are sure that we will…

13 years ago

TheAndroid.DDoS.1.origin, a new malware detected on Android mobile

In line with expectations a new cyber threat is menacing the mobile, in particular the most diffused OS, Android. The…

13 years ago

US develop exploitation methods for mobile devices while refuse UN treaty

Just one week ago a UN treaty was approved to update 24-year-old United Nations telecommunications rules. The agreement states that…

13 years ago

This website uses cookies.