Hackers steal money from Starbucks mobile customers using linked credit cards, nearly 16 million customers who use the company app are at risk. Starbucks is the last victim of scammers, cyber criminals are syphoning money from the credit or debit card linked to the customers’ Starbucks accounts. The attack is quite simple for fraudsters, the criminal […]
Canadian mobile users were targeted by the latest variant of the Koler Android mobile ransomware after visiting websites proposing adult content. Once again, visitors of websites proposing adult content are targeted by cyber criminals. Last week a malvertising campaign hit visitors of the adult website XHamster, now Canadian Internet users victims were targeted by a […]
Security researchers at FireEye have discovered a vulnerability in the Samsung Galaxy S5 that allows hackers to clone fingerprints. Samsung Galaxy S5 and other âunnamed Android devicesâ could leak user fingerprints to hackers that can clone them. According to security experts at FireEye, although Samsung implements encryption mechanism to protect user fingerprints archived on the mobile […]
Israeli security researchers have discovered a SSL certificate parsing vulnerability affecting iOS devices that could force them into endless reboot loop. Yair Amit and Adi Sharabani, security experts at the Israeli security firm Skycure have demonstrated at the RSA Conference 2015 the exploitation of a vulnerability that can force any Apple iPhone or iPad into a perpetual reboot loop. The experts explained […]
Security researchers discovered a bug in WiFi SSID management that could be exploited by hackers to crash Android, Windows, Linux systems or hack them. In an e-mail published on the Open Source Software Security (oss-security) mailing list, a user reported a serious vulnerability that could allow attackers to crash devices or even potentially inject malware […]
The well-known hacker Stefan Esser, also known as iOn1c, first published a concept video of the jailbreak iOS 8.4 beta 1 running on iPhone 6. Apple has just released the iOS 8.4 beta version for its mobile devices and the popular hacker Stefan Esser, also known as i0n1c, has already released a jailbreak to the community of […]
Encryption has been used by more people over time and this has led to the NSA and the US Government to suggest new ways of accessing encrypted content. The uprising course of encryption and the fact that its use has become a lot more frequent and continues on increasing in popularity has made the United States wonder how they […]
A team or researchers sponsored by the US DARPA has developed a new innovative tool to improve the detection of Android malware. The blue team of DARPA (Defense Advanced Research Projects Agency) backed up by Iowa State University researchers are developing a tool that will help with Android malware analysis. The features used by the […]
Experts at Palo Alto Networks discovered the Installer Hijacking vulnerability that exposes half of Android users to attack via Installation Vulnerability. The security researcher Zhi Xu from Palo Alto Networks discovered a critical vulnerability, dubbed Android Installer Hijacking, affecting the Android PackageInstaller system service. By exploiting the flaw, an attacker can gain unlimited permissions on compromised smartphone and data […]
Despite principal vendors have released updates to fix the FREAK vulnerability many mobile apps for Android and Apple iOS are still vulnerable. Early March, security experts discovered a critical vulnerability codenamed FREAK (CVE-2015-0204), also known as Factoring Attack on RSA-EXPORT Keys, which could be exploited by threat actors to run man-in-the-middle attacks on encrypted traffic when Internet users visited […]