• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Over 30k Internet-Exposed QNAP NAS hosts impacted by CVE-2022-27596 flaw
  • Pro-Russia Killnet group hit Dutch and European hospitals
  • New Prilex PoS Malware evolves to target NFC-enabled credit cards
  • New LockBit Green ransomware variant borrows code from Conti ransomware
  • Nevada Ransomware Has Released Upgraded Locker
  • TrickGate, a packer used by malware to evade detection since 2016
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Mobile (Page 60)

Mobile

The critical iOS bug allowed hackers to impersonate users

Apple has fixed a critical vulnerability in its iOS operating system that allowed hackers to impersonate end users. Apple has fixed a serious vulnerability in the iOS operating system that could be exploited by hackers to impersonate users who visit...

January 21, 2016  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Mobile 

Android banking malware SlemBunk continues to evolve

Experts at FireEye noticed a significant evolution of SlemBunk, a powerful Android Trojan is targeting bank users worldwide. In December security experts at FireEye first spotted the Android banking TrojanĀ SlemBunk, a threat specifically designed to target...

January 15, 2016  By Pierluigi Paganini   Posted In  Breaking News  Malware  Mobile 

Amaq, the new ISIS Android App for secure communications

The IS has developed an Android app dubbed Amaq Agency app demonstrating how powerful modern communications technology can be for a radical group. Which are the communication channels used by members of the ISIS? Which are the messaging services they...

January 14, 2016  By Pierluigi Paganini   Posted In  Breaking News  Intelligence  Mobile 

The Android Bankosy malware steals banking OTPs

Security experts at Symantec detect a new strain of the Android Bankosy malware that steals passwords sent through voice calls generated by 2FA systems. One-time passcodes, a crucial defense for online banking applications, are being intercepted by a malware...

January 13, 2016  By Pierluigi Paganini   Posted In  Breaking News  Malware  Mobile 

Silent Circle promptly patched a critical flaw in the Blackphone I

Silent Circle released an update for its Blackphone 1 that fixes a critical flaw in the modem. Silent Circle has released an update for its Blackphone device that fixes several security vulnerabilities, including a flaw in its modem (CVE-2015-6841) that...

January 7, 2016  By Pierluigi Paganini   Posted In  Breaking News  Digital ID  Mobile  Security 

Google will switch from Java APIs to OpenJDK

Google confirms that the next Android versions will use Oracle’s open-source OpenJDK instead the Java APIs, a strategic choice. Google is leaving Java application programming interfaces (APIs) in future versions of its mobile operating system Android....

December 31, 2015  By Pierluigi Paganini   Posted In  Breaking News  Mobile  Security 

InterApp, the device that can hack any Smartphone

The Tel Aviv-based Rayzone Group is offering for sale a gadget called InterApp that can intercept and exfiltrate information from nearby smartphones. InterApp is a device designed by the IsraeliĀ Rayzone Group that canĀ spy on any smartphone. "InterApp...

December 27, 2015  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Intelligence  Mobile  Security 

How to Crash WhatsApp with simple smileys

The independent researcher Ā Indrajeet Bhuyan has demonstrated that is possible to crash the popular messaging app Whatsapp by sending crazy smileys. Crash our Friends' WhatsApp could be quite easy, this is whatĀ the independent researcher Indrajeet...

December 22, 2015  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Mobile 

iOS Mobile Banking Apps, what is changed from 2013 tests?

The security expert Ariel Sanchez presented the results of the test conducted on 40 iOS banking apps, comparing them to the ones obtained 2 years ago. The banking industry is looking with an increasing interest inĀ mobileĀ platform, financial institutes...

December 21, 2015  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Mobile  Security 

Phone House – Personal data of 12+ million Dutch mobile customers open to hackers

Basically all Dutch citizens who own a mobile phone are at risk of attack due to poor security practices at the Phone House. The Ā freelance IT security consultantĀ Sijmen Ruwhof discovered that personal info of more than 12 million Dutch mobile...

December 20, 2015  By Pierluigi Paganini   Posted In  Breaking News  Mobile  Security 


« First‹ Previous565758596061626364Next ›Last »
Page 60 of 76



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking ā€œAccept Allā€, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
Go to mobile version