Beware: a simple SMS could compromise all your mobile phone’s traffic
When purchasing a new smartphone, while we are traveling in another country or when we change our phone number, we need to insert a new SIM card into the device.Read More →
Mobile Security Incident News | Infosec Blog | Mobile Security Tutorials
When purchasing a new smartphone, while we are traveling in another country or when we change our phone number, we need to insert a new SIM card into the device.Read More →
According to information security services specialists, the new version of the CamScanner app is now available on the Google Play Store. As reported a few days ago, a team ofRead More →
As we have mentioned in previous occasions, the concept “zero-day vulnerability” refers to flaws in software never before discovered and whose exploitation does not require user of the compromised systemRead More →
A few days ago, some of the organizers of the protests in Hong Kong accused Chinese authorities of exploiting a feature on the messaging platform Telegram to obtain their phoneRead More →
Security flaws in dozens, or even hundreds, of Android apps available on the Play Store platform remain a serious inconvenience for Google, app developers and especially users. According to vulnerabilityRead More →
Shortly after the implementation of the function to delete messages on WhatsApp, in addition to other similar platforms, apps began to appear that offer users to retrieve these messages. AccordingRead More →
Someone could lose their job due to a disastrous oversight. Vulnerability testing specialists found that Apple accidentally removed a security patch in iOS 12.4, the latest version of its operatingRead More →
Despite the security controls set on the platform, malware can sometimes be spotted into apps available on Google Play Store. Specialists in digital forensics of security firm TrendMicro have detectedRead More →
The developers of PUBG for mobile have declared war on malicious users on the platform. According to web application security specialists, the game’s developers released a list of the namesRead More →
Facebook has recently committed multiple violations against user privacy and data protection rules, and it seems this kind of news will not stop appearing. Experts in system audits have reportedRead More →
Regardless of maker, model, cost, among other variables, any smartphone we buy has pre-installed applications from the factory. According to experts in ethical hacking, while some of these apps helpRead More →
Currently there is a mobile app related to any need, service or hobby, even to arrange sexual encounters with complete strangers. However, like any online service, such applications are exposedRead More →
Technology users’ privacy should take a much more relevant approach for these companies, and Apple’s announcement is proof of that. In order to prevent apps like Facebook Messenger and WhatsAppRead More →
Different users have their own requirement for using any application. For finding any good application which make our task to be done quickly. Users usually uses android play store forRead More →
As social media users, we are all exposed to various malicious activities, especially younger people. According to information security experts, some threat actors are taking advantage of a small InstagramRead More →
For a few months now WhatsApp began to take some steps to try to combat the mass sending of fake news through this platform. As reported by web application securityRead More →
Privacy is a primary feature for many users of online services concerned about their information security, so tools like Telegram, instant messaging app with a specialized focus on privacy findRead More →
Technology companies get involve in increasingly invasive practices, so users’ privacy is compromised as never seen before. According to information security services specialists, Apple and its contractors have access toRead More →
Earlier in part I we have shown adb hacks which are used in testing or foot printing phases. That how adb (android debug bridge) can be used in gathering informationRead More →
Before knowing the rooting process, you must understand android architecture. On how android applications work or how Linux kernel provide services to the upper layer, all these concepts are theRead More →