• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Safari 15.6.1 addresses a zero-day flaw actively exploited in the wild
  • Google blocked the largest Layer 7 DDoS reported to date
  • BlackByte ransomware v2 is out with new extortion novelties
  • Apple fixed two new zero-day flaws exploited by threat actors
  • PoC exploit code for critical Realtek RCE flaw released online
  • China-linked RedAlpha behind multi-year credential theft campaign
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Mobile (Page 70)

Mobile

British Prime Minister wants to ban Online Messaging Apps including WhatsApp

Prime Minister Cameron said that the UK would pursue banning encrypted messaging apps if the Intelligence was not given access to the communications. At this historical moment, governments are facing increasingly dangerous cyber threats, but their activities...

January 13, 2015  By Pierluigi Paganini   Posted In  Intelligence  Mobile  Security 

CoolReaper, a Backdoor in million Coolpad Android devices

Palo Alto Networks discovered that the software installed on many of Coolpad high-end Android phones includes a CoolReaper backdoor. The US security firm Palo Alto Networks have discovered that millions of Android smartphones commercialized by the Chinese...

December 18, 2014  By Pierluigi Paganini   Posted In  Mobile 

LogDog Internet Security Survey – November 2014

Mobile developers behind the Logdog app have conducted a rapid survey to analyze the trend in the hacking of accounts for the principal web services. A few weeks ago I was contacted by LogDog, a company that has developed is free protection app from...

December 15, 2014  By Pierluigi Paganini   Posted In  Mobile 

GCHQ launches Cryptoy mobile app to teach cryptography

Cryptoy is the free educational app about cryptography designed by GCHQ for use by secondary school students and their teachers. The British Intelligence agency GCHQ has launched "Cryptoy", an Android mobile app that was designed to encourage...

December 15, 2014  By Pierluigi Paganini   Posted In  Intelligence  Mobile  Security 

Android malware used to spread pirated Assassin Creed App

Security experts at Zscaler discovered a pirated version of the Assassin Creed mobile app for Android that was used to spread a malware. Security experts at Zscaler discovered a trojanized and pirated version of the popular Assassin Creed application...

December 14, 2014  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Mobile 

Internet of Things – Security and privacy issues presented at ISACA Roma & OWASP Italy conference

Yesterday Pierluigi Paganini presented at the ISACA Roma & OWASP Italy conference the state of the art for the Internet of Things paradigm. Yesterday I presented at the ISACA Roma & OWASP Italy conference the state of the art for the Internet...

December 13, 2014  By Pierluigi Paganini   Posted In  Cyber Crime  Intelligence  Mobile  Security 

93 percent of Government Chinese websites are vulnerable

A report issued by the China Software Testing Center revealed that 93 percent of Chinese websites are vulnerable to cyber attacks. Nearly 93 percent of 1,000 Chinese government websites under evaluation is affected by vulnerabilities and other security...

December 8, 2014  By Pierluigi Paganini   Posted In  Hacking  Mobile  Security 

DeathRing, a new Pre-loaded mobile trojan in the wild

The number of Pre-loaded mobile trojan in the wild is increasing, DeathRing is the last one discovered by the experts at Lookout firm. It's not first the time that Android handsets come preloaded with malware, but cyber security experts are warning...

December 5, 2014  By Pierluigi Paganini   Posted In  Malware  Mobile 

Crashing WhatsApp by sending a specially crafted message

Indian researchers have discovered a flaw in WhatsApp that allows anyone to remotely crash the popular mobile app by sending a specially crafted message. A "nice" vulnerability has been discovered in the popular messaging app WhatsApp that could...

December 1, 2014  By Pierluigi Paganini   Posted In  Hacking  Mobile 

The Twitter App Graph feature will track users mobile apps for commercial purposes

Twitter announced app graph, it will now track every mobile app its users have Installed on their smartphones and tables.  Privacy advocates arise. Twitter announced the implementation of the "app graph" function that will allow the company to provide...

November 28, 2014  By Pierluigi Paganini   Posted In  Digital ID  Mobile 


« First‹ Previous6667686970717273Next ›
Page 70 of 73



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT