• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Security Affairs newsletter Round 405 by Pierluigi Paganini
  • CISA adds Oracle, SugarCRM bugs to its Known Exploited Vulnerabilities Catalog
  • GoAnywhere MFT zero-day flaw actively exploited
  • CERT-FR warns of a new wave of ransomware attacks targeting VMware ESXi servers
  • Tallahassee Memorial HealthCare, Florida, has taken IT systems offline after cyberattack
  • Exploitation attempts for Oracle E-Business Suite flaw observed after PoC release
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Mobile (Page 7)

Mobile

SharkBot, the new generation banking Trojan distributed via Play Store

SharkBot banking malware was able to evade Google Play Store security checks masqueraded as an antivirus app. SharkBot is a banking trojan that has been active since October 2021, it allows to steal banking account credentials and bypass multi-factor...

March 7, 2022  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking  Malware  Mobile 

Xenomorph Android banking trojan distributed via Google Play Store

Xenomorph Android trojan has been observed distributed via the official Google Play Store targeting 56 European banks. Researchers from ThreatFabric have spotted a new Android banking trojan, dubbed Xenomorph, distributed via the official Google...

February 21, 2022  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking  Malware  Mobile 

How SMS PVA services could undermine SMS-based verification

Crooks abuse some SMS PVA services that allow their customers to create disposable user accounts to conduct malicious activities. While investigating SMS PVA services (phone-verified account services), Trend Micro researchers discovered a rogue platform...

February 21, 2022  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking  Mobile 

Google Privacy Sandbox promises to protect user privacy online

Google introduces Privacy Sandbox on Android aimed at leading to more private advertising solutions for mobile users. Google announced Privacy Sandbox on Android to limit user data sharing and prevent the use of cross-app identifiers. The company...

February 18, 2022  By Pierluigi Paganini   Posted In  Breaking News  Mobile  Security 

Finnish diplomats’ devices infected with Pegasus spyware

Finland Ministry for Foreign Affairs revealed that devices of Finnish diplomats have been infected with NSO Group's Pegasus spyware. Finland's Ministry for Foreign Affairs revealed that the devices of some Finnish diplomats have been compromised with...

January 28, 2022  By Pierluigi Paganini   Posted In  Breaking News  Cyber warfare  Hacking  Intelligence  Malware  Mobile 

Latest version of Android RAT BRATA wipes devices after stealing data

A new version of the BRATA malware implements a functionality to perform a factory reset of the device to wipe all data. The new version of the BRATA Android malware supports new features, including GPS tracking and a functionality to perform a factory...

January 25, 2022  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking  Malware  Mobile 

Swiss army asks its personnel to use the Threema instant-messaging app

The Swiss army has banned all instant messaging apps, including Signal, Telegram, and WhatsApp, recommending the use of the Threema app. The Swiss army has banned foreign instant messaging apps such as Signal, Telegram, and WhatsApp and only allows...

January 9, 2022  By Pierluigi Paganini   Posted In  Breaking News  Digital ID  Mobile  Security 

FluBot malware continues to evolve. What’s new in Version 5.0 and beyond?

Researchers warn of new campaigns distributing a new improved version of the FluBot malware posing as Flash Player. Researchers from F5 security are warning of a new enhanced version of the FluBot Android malware that that spread posed as Flash Player....

January 8, 2022  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Malware  Mobile 

North Korea-linked Konni APT targets Russian diplomatic bodies

North Korea-linked APT group Konni targets Russian Federation's Ministry of Foreign Affairs (MID) new versions of malware implants. Security researchers at Cluster25 uncovered a recent campaign carried out by the North Korea-linked Konni APT group...

January 6, 2022  By Pierluigi Paganini   Posted In  APT  Breaking News  Cyber Crime  Cyber warfare  Mobile 

NoReboot persistence technique fakes iPhone shutdown

Researchers devised a sophisticated persistence technique, named NoReboot, for iOS malware that fake shut downs. Researchers from Zecops devised a sophisticated persistence technique, named NoReboot, for iOS malware that fake shut downs while spies...

January 6, 2022  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Mobile 


« First‹ Previous34567891011Next ›Last »
Page 7 of 76



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
Go to mobile version