• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • WhatsApp fixes Face ID and Touch ID authentication bypass
  • Google forgot to tell customers that Nest Hub has a microphone
  • Cisco addresses flaws in HyperFlex and Prime Infrastructure
  • Expert found a DoS flaw in Windows Servers running IIS
  • Adobe released second fix for the same Adobe Reader flaw
  • Security experts released new GandCrab Decryptor for free
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Mobile (Page 5)

Mobile

Amnesty International employee targeted with NSO group surveillance malware

An employee at Amnesty International has been targeted with Israeli surveillance malware, the news was revealed by the human rights group. Amnesty International revealed that one of its employees was targeted with a surveillance malware developed by an Israeli...

August 2, 2018  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Intelligence  Malware  Mobile  Reports 

Hundreds of apps removed from Google Play store because were carrying Windows malware

Google recently removed 145 applications from the official Google Play store because they were found to carry malicious Windows executables inside. Researchers from Palo Alto Networks revealed that Google removed more than 145 apps from the Play store ...

August 1, 2018  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Malware  Mobile 

Google bans cryptocurrency mining apps from the official Play Store

Google has updated the Play Store Developer Policy page to ban mobile mining apps that mine cryptocurrencies using the computational resources of the devices. Due to the surge in cryptocurrency prices, many legitimate websites and mobile apps are increasingly...

July 28, 2018  By Pierluigi Paganini   Posted In  Breaking News  Digital ID  Hacking  Mobile 

CVE-2018-5383 Bluetooth flaw allows attackers to monitor and manipulate traffic

Security researchers have found a high severity flaw (CVE-2018-5383) affecting some Bluetooth implementations that allow attackers to manipulate traffic. Security researchers at the Israel Institute of Technology have found a high severity vulnerability...

July 24, 2018  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Mobile 

Android Debugging Tools Also Useful for Compromising Devices, Mining Cryptocurrency

It is common for developers to use debugging tools with elevated privileges while they are trying to troubleshoot their code. But crooks can abuse them too. In an ideal world, all of the security controls are applied and all of the debugging tools are removed...

July 24, 2018  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Mobile 

Experts warn of new campaigns leveraging Mirai and Gafgyt variants

Security experts are warning of an intensification of attacks powered by two notorious IoT botnets, Mirai and Gafgyt. Security experts are warning of a new wave of attacks powered by two botnets, Mirai and Gafgyt. Since the code of the infamous Mirai...

July 23, 2018  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Mobile 

CSE Malware ZLab – APT-C-27 ’s long-term espionage campaign in Syria is still ongoing

Researchers at CSE Cybsec ZLab analyzed a malicious code involved in a long-term espionage campaign in Syria attributed to a APT-C-27 group. A few days ago, the security researcher Lukas Stefanko from ESET discovered an open repository containing some...

July 23, 2018  By Pierluigi Paganini   Posted In  Breaking News  Intelligence  Malware  Mobile  Reports 

Just using a $39 device it is possible to defeat new iOS USB Restricted Mode

Once USB Restricted Mode is enabled on a device, no data communications occur over the Lightning port, but experts found a way to reset the countdown timer. Recently Apple released the iOS 11.4.1 that introduced a new security feature, dubbed USB Restricted...

July 10, 2018  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Mobile  Security 

Google July 2018 Android patches fixes critical vulnerabilities

This week Google released the July 2018 Android patches that address tens of vulnerabilities in the popular mobile operating system. Google released the July 2018 Android patches that address a total of 11 vulnerabilities, including three Critical issues...

July 6, 2018  By Pierluigi Paganini   Posted In  Breaking News  Mobile  Security 

Hamas cyber-operatives lure Israeli soldiers to spyware hidden in tainted apps

Israeli military intelligence accused Hamas operatives of creating tainted apps to lure soldiers into downloading spyware onto their phones. According to a report published by the Israeli military, Hamas hackers are attempting to lure Israel Defence...

July 6, 2018  By Pierluigi Paganini   Posted In  Breaking News  Cyber warfare  Intelligence  Malware  Mobile 


‹ Previous123456789Next ›Last »
Page 5 of 47




Copyright 2015 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More