• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Anonymous leaked 128GB of data stolen from Russian ISP Convex revealing FSB's warrantless surveillance
  • Italy, France and Singapore Warn of a Spike in ESXI Ransomware
  • Royal Ransomware adds support for encrypting Linux, VMware ESXi systems
  • Italian National Cybersecurity Agency (ACN) warns of massive ransomware campaign targeting VMware ESXi servers
  • Microsoft attributes Charlie Hebdo data leak to Iran-linked NEPTUNIUM APT
  • Security Affairs newsletter Round 405 by Pierluigi Paganini
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Mobile (Page 72)

Mobile

More than 16 million mobile devices are infected worldwide

A recent study published by Alcatel-Lucent's Motive Security Labs reported that 16 million mobile devices worldwide have been infected by malware. Security experts noticed a significant increase in cyber threats to mobile and residential devices and attacks...

February 13, 2015  By Pierluigi Paganini   Posted In  Malware  Mobile  Security 

How to remotely install malicious apps on Android devices

Security researchers discovered how to install and launch malicious applications remotely on Android devices exploiting two flaws. Security researchers have uncovered a couple of vulnerabilities in the Google Play Store that could allow cyber criminals...

February 13, 2015  By Pierluigi Paganini   Posted In  Hacking  Mobile 

Volume License Trojan Chanitor targets enterprises

Cisco experts discovered a phishing campaign that is spreading fake Volume License Trojan Chanitor to corporate users and is able to evade sandboxes. A few weeks ago, multiple Cisco Managed Threat Defense (MTD) customers received an email that appeared...

February 10, 2015  By Pierluigi Paganini   Posted In  Cyber Crime  Mobile 

WhatsSpy Public tool can spy on Whatsapp users

WhatsSpy Public is a web-based tool that could allow an attacker to access Whatsapp user information related to his activity. WhatsSpy Public is a web-based tool created by Maikel Zweerink that can trace the moves of a WhatsApp user. WhatsSpy is able...

February 9, 2015  By Pierluigi Paganini   Posted In  Hacking  Mobile  Security 

11 percent of mobile banking apps includes harmful code

A recent study published by RiskIQ security firm revealed that more than 11 percent of mobile banking apps includes harmful code. With the rapid spread of mobile banking services has increased significantly the number of cyber crimes targeting users...

February 7, 2015  By Pierluigi Paganini   Posted In  Malware  Mobile  Security 

Fake WhatsApp for Web offered in the wild

Cybercriminals are offering worldwide a fake WhatsApp for Web in spam campaign with the intent to serve banking malware and run other kinds of scams. Recently WhatsApp launched its web service that could be used by using Google Chrome and allows users...

February 7, 2015  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Mobile  Security 

Operation Pawn Storm hackers use a iOS spyware

By investigating on the cyber espionage campaign dubbed Operation Pawn Storm, experts at TrendLabs discovered a spyware designed for iOS devices. Security experts at TrendLabs have discovered a new espionage iOS app while they were investigating on the cyber...

February 4, 2015  By Pierluigi Paganini   Posted In  Cyber Crime  Intelligence  Malware  Mobile 

Android adware infected more than 15 millions users via Play store

Security experts at Avast have discovered three malicious Android apps that were serving Adware, more than 15 million users infected via Play store. Adware is one of the most insidious threat to the mobile platform, this family of malicious code...

February 4, 2015  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Mobile 

Official NFL apps (both iOS and Android) Vulnerable to Easy Hacking

It is now emerging that the official NFL app for IOS and Android is vulnerable to easy hacking. The app apparently sends unencrypted data to NFL servers and can therefore be hacked by anyone monitoring user traffic. With only a few days remaining before...

January 28, 2015  By Pierluigi Paganini   Posted In  Mobile 

Verizon FiOS app flaw exposes 5 Million Customers’ accounts

Security expert discovered a critical flaw in Verizon's FiOS mobile app that could be exploited to access the email account of any Verizon customer. A new critical vulnerability in exposing million accounts to cyber threats, this time the flaw affects...

January 19, 2015  By Pierluigi Paganini   Posted In  Hacking  Mobile  Security 


« First‹ Previous686970717273747576Next ›Last »
Page 72 of 76



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
Go to mobile version