Exploiting The Wi-Fi Stack on Apple Devices
Earlier this year we performed research into Broadcom’s Wi-Fi stack. Due to the ubiquity of Broadcom’s stack, we chose to conduct our prior research through the lens of one affectedRead More →
Mobile Security Incident News | Infosec Blog | Mobile Security Tutorials
Earlier this year we performed research into Broadcom’s Wi-Fi stack. Due to the ubiquity of Broadcom’s stack, we chose to conduct our prior research through the lens of one affectedRead More →
EXIF through a gift shop full of personal data. In what looks like an Apple oversight, a developer has discovered that apps can access image metadata and therefore a prettyRead More →
Earlier this year, WhatsApp users in the country had started experiencing difficulties in sending photos and videos to their contacts. The services of the Facebook-owned messaging app had been disrupted byRead More →
GO Keyboard, an insanely popular custom keyboard app for the Android OS, also available on the official Google Play Store, was caught collecting user data and downloading and running codeRead More →
The UK government has made no secret of its dislike of encrypted messaging tools, and it has made frequent reference to the problems WhatsApp causes it with regard to investigations into terrorism.Read More →
iTerm2, a popular Mac application that comes as a replacement for Apple’s official Terminal app, just received a security fix minutes ago for a severe security issue that leaked terminalRead More →
Security researchers have detected a new Android banking trojan by the name of Red Alert 2.0 that was developed during the past few months and has been recently rolled outRead More →
A new security feature added in macOS High Sierra (10.13) named “Secure Kernel Extension Loading” (SKEL) can be bypassed to allow the loading of malicious kernel extensions. Just like LinuxRead More →
A team of Oxford and Cambridge researchers is the latest to join a chorus of voices sounding the alarm on a new attack vector named Intra-Library Collusion (ILC) that couldRead More →
Security researchers warned of a high-severity Android flaw on Thursday that stems from what they call a “toast attack” overlay vulnerability. Researchers say criminals could use the Android’s toast notification,Read More →
Six scientists from Zhejiang University in China have discovered that they could use ultrasound frequencies — inaudible to human ears — to send commands to speech recognition software and takeRead More →
An attacker can downgrade components of the Android TrustZone technology to older versions that feature known vulnerabilities and use older exploits against smartphones running an up-to-date operating system. According toRead More →
The authors behind the Android banking malware family Svpeng have added a keylogger to a recent strain, giving attackers yet another way to steal sensitive data. Roman Unuchek, a seniorRead More →
This week, with the release of Windows 10 Insider Preview Build 16251 for PC, Microsoft added support for linking Android devices to one’s computer, allowing users to share files fromRead More →
Wikileaks released the documentation for HighRise, an Android app used by the CIA to intercept and redirecting SMS messages to a CIA-controlled server. WikiLeaks just published a new batch ofRead More →
The world’s two most popular mobile platforms are affected by a security vulnerability called Broadpwn and which allows attackers to gain remote code execution rights on unpatched devices. The security flaw wasRead More →
Google warned of a serious flaw dubbed BroadPwn in some Broadcom Wi-Fi chipsets that potentially impacts millions of Android devices. Google published the monthly security update for Android devices, it warned ofRead More →
Security experts have discovered a brand new Android trojan that features a broad range of features that allow it to root Android devices, steal data from over 40 apps, andRead More →
Check Point researchers identified a mobile malware that infected 14 million Android devices, rooting approximately 8 million of them, and earning the hackers behind the campaign approximately $1.5 million inRead More →
Hacking WiFi networks is an important part of learning the subtleties of ethical hacking and penetration testing. This also gives rise to the need for some quality WiFi hacking appsRead More →