Exploiting The Wi-Fi Stack on Apple Devices
Earlier this year we performed research into Broadcom’s Wi-Fi stack. Due to the ubiquity of Broadcom’s stack, we chose to conduct our prior research through the lens of one affectedRead More →
Mobile Security Incident News | Infosec Blog | Mobile Security Tutorials
Earlier this year we performed research into Broadcom’s Wi-Fi stack. Due to the ubiquity of Broadcom’s stack, we chose to conduct our prior research through the lens of one affectedRead More →
EXIF through a gift shop full of personal data. In what looks like an Apple oversight, a developer has discovered that apps can access image metadata and therefore a prettyRead More →
Earlier this year, WhatsApp users in the country had started experiencing difficulties in sending photos and videos to their contacts. The services of the Facebook-owned messaging app had been disrupted byRead More →
GO Keyboard, an insanely popular custom keyboard app for the Android OS, also available on the official Google Play Store, was caught collecting user data and downloading and running codeRead More →
The UK government has made no secret of its dislike of encrypted messaging tools, and it has made frequent reference to the problems WhatsApp causes it with regard to investigations into terrorism.Read More →
iTerm2, a popular Mac application that comes as a replacement for Apple’s official Terminal app, just received a security fix minutes ago for a severe security issue that leaked terminalRead More →
Security researchers have detected a new Android banking trojan by the name of Red Alert 2.0 that was developed during the past few months and has been recently rolled outRead More →
A new security feature added in macOS High Sierra (10.13) named “Secure Kernel Extension Loading” (SKEL) can be bypassed to allow the loading of malicious kernel extensions. Just like LinuxRead More →
A team of Oxford and Cambridge researchers is the latest to join a chorus of voices sounding the alarm on a new attack vector named Intra-Library Collusion (ILC) that couldRead More →
Security researchers warned of a high-severity Android flaw on Thursday that stems from what they call a “toast attack” overlay vulnerability. Researchers say criminals could use the Android’s toast notification,Read More →