How I Hacked an Android App to Get Free Beer
Just recently I stumbled upon an Android app that lets you receive free products in various pubs, restaurants or cafes in exchange for points accumulated with previous purchases. When theRead More →
Mobile Security Incident News | Infosec Blog | Mobile Security Tutorials
Just recently I stumbled upon an Android app that lets you receive free products in various pubs, restaurants or cafes in exchange for points accumulated with previous purchases. When theRead More →
Google’s Android security team has patched a vulnerability that left Nexus 5X devices open to attack even if the phone’s screen was locked. The vulnerability in Google’s line of phonesRead More →
Its name is the Trident: a chain of zero-day exploits that aim to infect iPhone with commercial spyware. Researchers linked it to the NSO group.Its name is the Trident: aRead More →
Technique works on virtually all USB drives with no modifications necessary. In 2013, a document leaked by former National Security Agency contractor Edward Snowden illustrated how a specially modified USB deviceRead More →
Let’s get into the nitty-gritty. The only way you can reset your password on Facebook (if you’ve forgotten one) is through entering a 6 digit passcode. Well that’s 10⁶ =Read More →
Today, Apple released the iOS 9.3.5 out-of-band security update, which fixes vulnerabilities that allows attackers to remotely jailbreak an iPhone in order to to install spyware. First discovered by Citizen Laband Lookout, theseRead More →
During the last weeks we’ve been investigating multiple aspects of GSM security such as protocol vulnerabilities as well as source auditing the world’s most common open source software products thatRead More →
Researcher claims that iPhone’s ‘Live Photos’ can be used to hack 2 banks apps. In a shocking discovery, a researcher found that 2 banks’ mobile phone apps were susceptible to hack,Read More →
If the malware found any German financial apps installed in the device, it would show a fake page asking for credentials of that particular institution. Unaware that the login pageRead More →
Off-path attack means malicious hackers can be located anywhere on the Internet. An estimated 80 percent of Android phones contain a recently discovered vulnerability that allows attackers to terminate connections and,Read More →
iMessage receives several fixes following mammoth research. Apple has added a series of short- and long-term defenses to the iMessage protocol following the private disclosure of several issues discovered by aRead More →
A little-known feature of many modern smartphones is their ability to duplicate video on the device’s screen so that it also shows up on a much larger display — likeRead More →
What do spies use to chat online? A terribly ugly Windows programme. At least, that’s what the Five Eyes intelligence alliance (made up of the US, UK, Australia, New Zealand andRead More →
Check Point today disclosed details about a set of four vulnerabilities affecting 900 million Android smartphones and tablets that use Qualcomm® chipsets. The Check Point mobile threat research team, whichRead More →
The security expert Salvador Mendoza demonstrated that is it easy to steal Samsung Pay tokens and reuse them to make fraudulent purchases. The security researcher Salvador Mendoza has discovered aRead More →
Venmo has patched multiple flaws that could have allowed an attacker to steal as much as $2,999.99 from unsuspecting victims using Siri. Venmo is a mobile app that allows friendsRead More →
A new trojan potentially threatens as many as 2.8 million Android users with unwanted mobile advertisements. On 29 July, researchers at the Russian computer security firm Doctor Web published anRead More →
Even 2FA can run up against limitations—like this Find My iPhone attack. As a graduate student studying cryptography, security and privacy (CrySP), software engineeringand human-computer interaction, I’ve learned a thing or twoRead More →
Facebook’s troubles in Brazil seems to be never-ending. The war between the social media giant and the government has been taking on heat for a while as the company-owned messagingRead More →
The HTML Source Code Viewer app by Sunuba Gaming poses as a development tool then steals pictures and videos from mobile devices. Last time we blogged about malware on GoogleRead More →