• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Tens of Jenkins plugins are affected by zero-day vulnerabilities
  • Microsoft: Raspberry Robin worm already infected hundreds of networks
  • Security Affairs newsletter Round 372 by Pierluigi Paganini
  • Half of actively exploited zero-day issues in H1 2022 are variants of previous flaws
  • The role of Social Media in modern society - Social Media Day 22 interview
  • Experts shared PoC exploit code for RCE in Zoho ManageEngine ADAudit Plus tool
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Posts tagged "mobile devices"

mobile devices

Check Point experts spotted pre-Installed Android Malware on 38 Android devices

Experts discovered pre-installed malware on 38 high-end smartphone models...

March 11, 2017  By Pierluigi Paganini

How much cost a StingRay? Surveillance is a profitable business

Motherboard published an interesting blog post which includes further details...

December 12, 2016  By Pierluigi Paganini

KeyRaider: iOS Malware targets over 225,000 Apple accounts

PaloAlto and with WeipTech have identified 92 samples of a new iOS malware...

August 31, 2015  By Pierluigi Paganini

IBM X-Force reported a billion data records leaked in 2014

Within the year of 2014, a lot of data was leaked and this leads to grave...

March 19, 2015  By Pierluigi Paganini

WhatsApp lack enforcing certificate pinning, users exposed to MITM

Experts at Praetorian have been conducting the Project Neptune to assess...

February 22, 2014  By Pierluigi Paganini

2013 mobile malware evolution and mobile devices security

Mobile devices security - Lookout proposed an interesting analysis for the mobile...

February 22, 2014  By Pierluigi Paganini

Samsung Knox Android-based solution contains a serious flaw

An Israeli security researcher from the Ben-Gurion University of the Negev’s...

December 27, 2013  By Pierluigi Paganini

Mobile devices and cyber espionage, principal concerns for governments

The use of mobile devices in government environments concerns the secret...

November 6, 2013  By Pierluigi Paganini

Android vulnerability makes 99% of mobile devices attackable

Bluebox Labs recently discovered an Android vulnerability in the OS's security...

July 5, 2013  By Pierluigi Paganini

Apple decrypts seized iPhones for law enforcement

Apple can "bypass the security software" if it chooses, accoring ATF no law enforcement...

May 12, 2013  By Pierluigi Paganini


12
Page 1 of 2


Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT