mobile

Pierluigi Paganini November 28, 2014
The Twitter App Graph feature will track users mobile apps for commercial purposes

Twitter announced app graph, it will now track every mobile app its users have Installed on their smartphones and tables.  Privacy advocates arise. Twitter announced the implementation of the “app graph” function that will allow the company to provide “more personal Twitter experience” by serving targeted advertisements by serving targeted advertisements. This means that also Twitter, like […]

Pierluigi Paganini November 25, 2014
Hacking RFID payment smart cards with an Android App

TrendMicro explained the mechanisms behind the hacking of RFID payment smartcards, explained how to do it with an Android App. Security experts recently spotted an Android app used to hack the NFC based electronic payment system used in Chile, the “Tarjeta BIP!”. The malicious Android app detected as ANDROIDOS_STIP.A was designed to attack NFC devices and distributed online through forums and blogs. […]

Pierluigi Paganini November 20, 2014
A new critical flaw affects Android OS except Lollipop

The security researcher Jann Horn discovered a privilege escalation flaw that affects Android OS devices except the Lollipop version. A critical vulnerability affects the Android OS versions prior to 5.0 that could be exploited by an attacker to bypass ASLR and run arbitrary code on a target device under specific conditions. The vulnerability was fixed in the latest version of […]

Pierluigi Paganini November 18, 2014
WhatsApp implements encryption by default on Android OS

WhatsApp implemented the encryption by default on Android OS with the collaboration of the Open Whisper company. Soon it will be extended to other platforms. Many time security community has discussed about security of the popular messaging application WhatsApp, early 2014 experts at Praetorian discovered different security issues in the way WhatApp implements SSL, the principal one is the […]

Pierluigi Paganini November 18, 2014
The latest Windows Phone 8.1 has been hacked

Operators of the XDA-developers forum explained how it is possible to hack Windows Phone 8.1 to run any app package in any Program directory. XDA-developers have discovered a new vulnerability in latest Microsoft OS Windows Phone 8.1 that could easily be exploited by attackers to compromise a Nokia Lumia phone running it. The XDA Developers member […]

Pierluigi Paganini November 11, 2014
Masque Attack – every iOS app could be compromised

Researchers at FireEye identified a new attack dubbed the Masque, which allows attackers to replace a genuine app with a malicious one. In these days Apple the community has discovered that is vulnerable to WireLurker, a new strain of malware that is able to infect Apple iPhone and iPad syphoning user’data. The malware was discovered for the […]

Pierluigi Paganini November 09, 2014
WireLurker malware is threatening Apple mobile devices

Security Experts at Palo Alto Networks have discovered a new variant of malware dubbed WireLurker that is infecting Apple mobile devices. A new strain of malware dubbed WireLurker  is threatening Apple users, the malicious code is able to infect Apple iPhone and iPad syphoning user’data. The malware was discovered for the first time by experts […]

Pierluigi Paganini November 02, 2014
Google Drive once again exploited in a sophisticated phishing attack

Cybercriminals and states-sponsored hackers are leveraging Google Drive site and other cloud storage to operate in a stealthy way and avoid detection. Cybercriminals and attackers are exploiting once again Google Drive infrastructure to avoid detection. The exploitation of Google Drive cloud storage by cyber criminals is not a novelty, a few days ago experts at […]

Pierluigi Paganini October 29, 2014
Sony Xperia Smartphones send user data in China

Security experts have discovered that Sony Xperia Smartphones secretly send user Data to servers in China due to the presence of the Baidu spyware. Sony Xperia Devices secretly send user data to servers in China, this is the last news that is shocking the mobile industry and that was published on several forums. The problem relates to Sony […]

Pierluigi Paganini October 28, 2014
Verizon Wireless tracks its clients with the UIDH technology

Verizon Wireless injects UIDH headers to every user’s Web request to track its web experience including visited websites and his habits. Verizon Wireless, the greatest US Telecom operator is tracking the internet traffic of its mobile users by adding a token to Web requests. The token is used by the company for advertising purpose, Verizon tracks the user’s habits, even if he had opted out […]