HACKERS FIND BUGS, EXTORT RANSOM AND CALL IT A PUBLIC SERVICE
Crooks breaking into enterprise networks are holding data they steal for ransom under the guise they are doing the company a favor by exposing a flaw. The criminal act isRead More →
Crooks breaking into enterprise networks are holding data they steal for ransom under the guise they are doing the company a favor by exposing a flaw. The criminal act isRead More →
Android phones may soon be able to send and receive iMessages thanks to a new open-source app called PieMessage. You can check out the work-in-progress app in action in the videoRead More →
Eight out of twelve apps vulnerable to new attack. This past Monday, at the GI Sicherheit 2016 security conference in Bonn, Germany, two researchers unveiled details about a new type ofRead More →
Android.Lockdroid ransomware expands to Asia by targeting Japan first. The malware poses as a system update and locks the device from use. One of the most prevalent Android ransomware threats inRead More →
A large percentage of Android devices is affected by security vulnerabilities that could be exploited by attackers to easily gain a Root Access. According to experts at TrendMicro a large percentageRead More →
Think of third-party app stores as independent shops in the city where people go to as an alternative to the city mall. The mall practically has everything you need. InRead More →
Cyber-crooks secretly develop new Asacub Android malware, deploy it for the first time this Christmas. Over the past six months, security experts from Kaspersky have observed the slow evolution of theRead More →
A new zero-day vulnerability allows Android or Linux applications to escalate privileges. Security researchers have discovered a new zero-day vulnerability in Linux kernel that affects both the Linux operating system and theRead More →
With the year-end shopping season over, many consumers now have new various smart gadgets in their homes. One particularly popular usage of this so-called Internet of Things (IoT) are smart TVs. TheseRead More →
Here at Gadget Hacks, we spend countless hours scouring the web to find the most interesting apps as they make their debuts, so the recent influx of new software hasRead More →
Malware authors employ open-source Android firewall utility to block security app from talking to their cloud servers.Even if some malware families never get to cause worldwide damage, it’s sometimes interestingRead More →
The flaws can be exploited remotely through emails, Web pages, MMS and rogue apps. Google has released a new batch of security fixes for its Nexus smartphones and tablets, addressing flawsRead More →
Why create your own rooting functions when someone else has already put the effort into doing the same thing Security researchers have detected a new trojan targeting Android devices, butRead More →
Smartphones are almost always connected to the internet, so it stands to reason that they can be hacked remotely. Or perhaps a jealous boyfriend or girlfriend got hold of yourRead More →
Vulnerability Test Suite (VTS) is a free application for Android that scans devices running the operating system for publicly-disclosed vulnerabilities. Publicly-disclosed vulnerabilities remain a threat months or even years afterRead More →
We at ESET recently discovered an interesting stealth attack on Android users, an app that is a regular game but with one interesting addition: the application was bundled with anotherRead More →
Android devices may be protected by a lock screen which requires some form of authentication before access to most phone features, its settings and the data stored on it isRead More →