• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Security Affairs newsletter Round 405 by Pierluigi Paganini
  • CISA adds Oracle, SugarCRM bugs to its Known Exploited Vulnerabilities Catalog
  • GoAnywhere MFT zero-day flaw actively exploited
  • CERT-FR warns of a new wave of ransomware attacks targeting VMware ESXi servers
  • Tallahassee Memorial HealthCare, Florida, has taken IT systems offline after cyberattack
  • Exploitation attempts for Oracle E-Business Suite flaw observed after PoC release
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Mobile (Page 6)

Mobile

ERMAC 2.0 Android Banking Trojan targets over 400 apps

A new version of the ERMAC Android banking trojan is able to target an increased number of apps. The ERMAC Android banking trojan version 2.0 can target an increasing number of applications, passing from 378 to 467 target applications to steal account...

May 27, 2022  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Malware  Mobile 

Over 200 Apps on Play Store were distributing Facestealer info-stealer

Experts spotted over 200 Android apps on the Play Store distributing spyware called Facestealer used to steal sensitive data. Trend Micro researchers spotted over 200 Android apps on the Play Store distributing spyware called Facestealer used...

May 17, 2022  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Malware  Mobile  Reports 

Experts show how to run malware on chips of a turned-off iPhone

Researchers devised an attack technique to tamper the firmware and execute a malware onto a Bluetooth chip when an iPhone is "off." A team of researchers from the Secure Mobile Networking Lab (SEEMOO) at the Technical University of Darmstadt demonstrated...

May 16, 2022  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Malware  Mobile 

Google addresses actively exploited Android flaw in the kernel

Google released the May security bulletin for Android, 2022-05-05 security patch level, which fixed an actively exploited Linux kernel flaw. Google has released the second part of the May Security Bulletin for Android, which includes a fix for an actively...

May 5, 2022  By Pierluigi Paganini   Posted In  Breaking News  Mobile  Security 

Anomaly Six, a US surveillance firm that tracks roughly 3 billion devices in real-time

An interesting article published by The Intercept reveals the secretive business of a US surveillance firm named Anomaly Six. When we speak about the secretive business of surveillance businesses we often refer to the powerful tools developed by Israeli...

April 26, 2022  By Pierluigi Paganini   Posted In  Breaking News  Digital ID  Intelligence  Mobile  Security 

Critical bug in decoder used by popular chipsets exposes 2/3 of Android devices to hack

A critical RCE flaw in Android devices running on Qualcomm and MediaTek chipsets could allow access to users' media files. Security researchers at Check Point Research have discovered a critical remote code execution that affects the implementation...

April 21, 2022  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Mobile  Security 

NSO Group Pegasus spyware leverages new zero-click iPhone exploit in recent attacks

Researchers reported that threat actors leveraged a new zero-click iMessage exploit to install NSO Group Pegasus on iPhones belonging to Catalans. Researchers from Citizen Lab have published a report detailing the use of a new zero-click iMessage...

April 19, 2022  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Intelligence  Malware  Mobile 

SharkBot Banking Trojan spreads through fake AV apps on Google Play

Experts discovered malicious Android apps on the Google Play Store masqueraded as antivirus solutions spreading the SharkBot Trojan. Researchers from the Check Point Research (CPR) team discovered several malicious Android apps on the official Google...

April 9, 2022  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking  Malware  Mobile  Security 

CVE-2022-22292 flaw could allow hacking of Samsung Android devices

Experts discovered a vulnerability, tracked as CVE-2022-22292, which can be exploited to compromise Android 9, 10, 11, and 12 devices. Researchers from mobile cybersecurity firm Kryptowire discovered a vulnerability, tracked as CVE-2022-22292, in Android...

April 7, 2022  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Mobile 

Samsung data breach: Lapsus$ gang stole Galaxy devices’ source code

Samsung confirmed that threat actors had access to the source code of its Galaxy smartphones in recent security breach. Samsung this week disclosed a data breach, threat actors had access to internal company data, including the source code of Galaxy...

March 9, 2022  By Pierluigi Paganini   Posted In  Breaking News  Data Breach  Hacking  Mobile  Security 


« First‹ Previous2345678910Next ›Last »
Page 6 of 76



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
Go to mobile version