ANDROID PATCH FIXES NEXUS 5X CRITICAL VULNERABILITY
Google’s Android security team has patched a vulnerability that left Nexus 5X devices open to attack even if the phone’s screen was locked. The vulnerability in Google’s line of phonesRead More →
Mobile Security Incident News | Infosec Blog | Mobile Security Tutorials
Google’s Android security team has patched a vulnerability that left Nexus 5X devices open to attack even if the phone’s screen was locked. The vulnerability in Google’s line of phonesRead More →
Its name is the Trident: a chain of zero-day exploits that aim to infect iPhone with commercial spyware. Researchers linked it to the NSO group.Its name is the Trident: aRead More →
Technique works on virtually all USB drives with no modifications necessary. In 2013, a document leaked by former National Security Agency contractor Edward Snowden illustrated how a specially modified USB deviceRead More →
Let’s get into the nitty-gritty. The only way you can reset your password on Facebook (if you’ve forgotten one) is through entering a 6 digit passcode. Well that’s 10⁶ =Read More →
Today, Apple released the iOS 9.3.5 out-of-band security update, which fixes vulnerabilities that allows attackers to remotely jailbreak an iPhone in order to to install spyware. First discovered by Citizen Laband Lookout, theseRead More →
During the last weeks we’ve been investigating multiple aspects of GSM security such as protocol vulnerabilities as well as source auditing the world’s most common open source software products thatRead More →
Researcher claims that iPhone’s ‘Live Photos’ can be used to hack 2 banks apps. In a shocking discovery, a researcher found that 2 banks’ mobile phone apps were susceptible to hack,Read More →
If the malware found any German financial apps installed in the device, it would show a fake page asking for credentials of that particular institution. Unaware that the login pageRead More →
Off-path attack means malicious hackers can be located anywhere on the Internet. An estimated 80 percent of Android phones contain a recently discovered vulnerability that allows attackers to terminate connections and,Read More →
iMessage receives several fixes following mammoth research. Apple has added a series of short- and long-term defenses to the iMessage protocol following the private disclosure of several issues discovered by aRead More →