FBI Wants You To “Just Pay The Ransom” to Cyber Criminals
The Federal Bureau of Investigation (FBI) has stated that it’s completely fine to pay ransom to cyber criminals. If you are a fan of Hollywood movies you may be familiar withRead More →
Mobile Security Incident News | Infosec Blog | Mobile Security Tutorials
The Federal Bureau of Investigation (FBI) has stated that it’s completely fine to pay ransom to cyber criminals. If you are a fan of Hollywood movies you may be familiar withRead More →
Buying and selling things online are just two of the many activities Internet users are fond of doing. For some, they shop for clothes, bags, shoes, jewelries, and books; forRead More →
A recent network forensic examination of popular messaging service WhatsApp is offering new details on the data that can be collected from the app’s network from its new calling feature:Read More →
As long as you meet the minimum speed requirements, that is. Shortly after the announcement of iOS 8 in 2014, Googlemade headlines by saying that it would make full-device encryptionRead More →
There’s a dark side to Android root providers, even when they’re fully disclosed. A handful of app distributors are putting hundreds of millions of Android users at risk by bundlingRead More →
Chinese team Pangu today released the first untethered jailbreak for iOS 9 devices, including the iPhone 6s and iPhone 6s Plus. The jailbreak tool is currently available for Windows only,Read More →
An ingenious hack could allow unwanted access to Siri commands by simply sending radio waves to a pair of unshielded iPhone earbuds. While the hack is needlessly complex – theRead More →
A common rule of thumb is that those who stick with the Google Play Store are safe from malware and other dangers. This is mostly the case, but once in a blueRead More →
APPLE’S IOS HAS had a good run in terms of security. For more than eight years it’s been wildly popular and yet virtually malware-free, long enough to easily earn theRead More →
The post includes a detailed procedure to hack and decrypt WhatsApp Database remotely on rooted Android mobile devices. Very Interesting!. A few hours ago it has been published an interestingRead More →
The malware spreads with the help of an adult movie player. Security researchers at Palo Alto Networks have discovered and analyzed malware that infects iOS devices and then injects ads intoRead More →
A Chinese mobile app promotion company has created malicious adware that allows them to gain complete control of users’ Android devices. The company misuses this access to make the phonesRead More →
Apple has reminded developers to verify their copy of Xcode before submitting iOS apps, but it probably won’t stop Chinese developers from using pirated versions of the free software. AfterRead More →
We at ESET recently discovered an interesting stealth attack on Android users, an app that is a regular game but with one interesting addition: the application was bundled with anotherRead More →
Govt mulls a policy that requires users to save messages, and hand them over to law enforcement agencies, if asked. Deleting WhatsApp messages might become difficult in India in theRead More →
New Android malware was discovered, able to steal money from online banking accounts, and hide SMS notifications coming to confirm financial transactions. This new malware detected by Dr.Web as theRead More →
Mobile VPN and Tor router can tether to public Wi-Fi—and charge your phone. Over the past year, there has been a burst of crowd-funded efforts to provide simple, inexpensive privacyRead More →
Apple is traditionally mum on some details of its devices’ hardware, preferring to talk about how “B is X times faster than A” than raw numbers. It’s partly a smartRead More →
Infected owners must choose between paying $500 and performing factory reset. Malicious apps that disable Android phones until owners pay a hefty ransom are growing increasingly malevolent and sophisticated asRead More →
Joshua Drake, the researcher who found the so-called Stagefright vulnerability in Android, today released exploit code to the public, which he hopes will be used to test systems’ exposure toRead More →