• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Over 30k Internet-Exposed QNAP NAS hosts impacted by CVE-2022-27596 flaw
  • Pro-Russia Killnet group hit Dutch and European hospitals
  • New Prilex PoS Malware evolves to target NFC-enabled credit cards
  • New LockBit Green ransomware variant borrows code from Conti ransomware
  • Nevada Ransomware Has Released Upgraded Locker
  • TrickGate, a packer used by malware to evade detection since 2016
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Mobile (Page 61)

Mobile

A secret cellphone spying devices catalog leaked online

Someone in the Intelligence community leaked online a secret catalog of cellphone spying devices used by law enforcement. The Intercept has leaked online a secret catalog of cellphone spying devices, the precious document has been given to the online...

December 18, 2015  By Pierluigi Paganini   Posted In  Breaking News  Intelligence  Laws and regulations  Mobile 

BackStab Malware steals iOS and BlackBerry Backups

Security experts at Palo Alto Networks have uncovered a new strain of malware dubbed BackStab that steals local mobile data backups. Security experts at Palo Alto Networks have uncovered a new strain of malware dubbed BackStab that steals local mobile...

December 8, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Malware  Mobile 

ISIS members have developed a mobile app for its communications

Ghost Security Group has reportedly discovered an Android mobile application used by members of the ISIS organization for secure communications. According to the Christian Science Monitor, the Ghost Security Group has reportedly discovered an Android...

December 7, 2015  By Pierluigi Paganini   Posted In  Breaking News  Intelligence  Mobile 

Millions of smart devices at risk from 3-year-old flaw

According to Trend Micro up to 6.1 million smart devices, including this smart TV and routers haven't patched a software vulnerability dating from 2012. Millions of smart TVs, routers and phones are at risk due to a presence of a 3-year-old vulnerability...

December 4, 2015  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Mobile 

Windows Phone hacked with Windows Phone Internals

Windows Phone Internals allows to unlock bootloader, enable Root access and create Custom ROM's on selected Windows Lumia mobile devices. We have spoken several times about jailbreaking and rooting activities explaining that these procedures allow to remove...

November 26, 2015  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Mobile 

Shedun adware can install any malicious mobile app by exploiting Android Accessibility Service

Shedun Trojanized adware family implements the ability to automatically install any app on the devices by exploiting the Android Accessibility Service. Android is once again in the storm, threat actors can install any malicious third-party app on mobile...

November 22, 2015  By Pierluigi Paganini   Posted In  Breaking News  Malware  Mobile 

Chrome exploit leaves million Android devices open to attack

At the MobilePwn2Own, a Chinese expert has demonstrated how to hijack an Android smartphone by exploiting a zero-day flaw in the Chrome browser. The Chinese expert Guang Gong from Qihoo 360 has demonstrated how to hijack an Android smartphone by exploiting...

November 14, 2015  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Mobile 

Snooping Samsung S6 calls with bogus base stations

A duo of security researchers, Daniel Komaromy of San Francisco and Nico Golde of Berlin, demonstrated how to intercept calls using bogus base stations. PacSec Modern Samsung devices, including the last generation Samsung S6, S6 Edge and Note 4, are vulnerable...

November 12, 2015  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Mobile 

Android Tablets with Pre-loaded Cloudsota malware sold on Amazon

Experts at Cheetah Mobile are warning about Android Tablet pre-loaded with Cloudsota Trojan sold on Amazon and other online stores. Once again electronics equipment from China was offered for sale with pre-installed Trojan. This time, several models...

November 12, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Malware  Mobile 

Ransomware infected the UK Parliament’s computer networks

A ransomware infected several PC at the UK Parliament, for the first time a threat hit the internal computer network, the Parliamentary Digital Service. Ransomware is once again in the headlines, this time the attention of the media was caught due to the nature...

November 11, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Mobile  Security 


« First‹ Previous575859606162636465Next ›Last »
Page 61 of 76



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
Go to mobile version