Most popular Android apps open users to MITM attacks
SSL Vulnerabilities: Who listens when Android applications talk? Summary The Android ecosystem is all about communicating, and right now it’s screaming for help. That’s because SSL vulnerabilities and...
View ArticleZIMPERIUM released zANTI 2.0
“After 3 years of work, we are excited to release zANTI 2.0 – completely free for community usage…” said Zuk Avraham, Zimperium co-founder and CEO. Android Network Toolkit (zANTI 2.0) is an...
View ArticleAppBuyer – New iOS Malware Steals Apple ID and Password to Buy Apps
Palo Alto Networks recently found and analyzed a new iOS malware affecting jail-broken iOS devices in the wild. The malware will connect to C&C server, download and execute malicious executable...
View ArticleRemote exploit vulnerability in bash CVE-2014-6271
A remotely exploitable vulnerability has been discovered by Stephane Chazelas in bash on Linux and it is unpleasant. The vulnerability has the CVE identifier CVE-2014-6271 and has been given the...
View ArticleWhat The Massive Shellshock Exploit Means For You
The big tech news of the moment, and probably of the year or decade, is the revelation about a massive security hole in something called Bash, which is an arcane bit of geek code which is installed on...
View ArticleUNHcFREG researchers disclosed flaws dozen Android apps
Researchers from the UNHcFREG (University of New Haven) is publishing on YouTube a series of videos to disclose vulnerabilities in a dozen Android apps. Experts at the University of New Haven’s Cyber...
View ArticleNew attack hides stealthy Android malware in images
A new technique that allows attackers to hide encrypted malicious Android applications inside images could be used to evade detection by antivirus products and possibly Google Play’s own malware...
View ArticleApple iOS 8 and Yosemite: The latest privacy invasion
Apple’s latest operating systems, Mac OS X Yosemite and iOS 8, both transmit your search terms back to Apple by default and it’s difficult to disable. Apple’s latest operating systems, Mac OS X...
View ArticleZero Day Hole found in Samsung FindMyMobile (CVE-2014-8346)
About FindMyMobile Samsung FindMyMobile is a mobile web-service that provides samsung users different features to locate lost device, lock a device remotely so that no one else can use the device, or...
View ArticleApple disabling the SSL3 support in Push Notification Service
Apple are about to disable SSL3 support in Apple Push Notification Service at Wednesday, October 29. Developers experiencing issues with Provider Communication interface in the development environment...
View ArticleMasque Attack — New iOS Vulnerability Allows Hackers to Replace Apps with...
Android have been a long time target for cyber criminals, but now it seems that they have turned their way towards iOS devices. Apple always says that hacking their devices is too difficult for...
View ArticleCVE-2014-7911: Billions of Android Devices Vulnerable to Privilege Escalation...
A security weakness in Android mobile operating system versions below 5.0 that puts potentially every Android device at risk for privilege escalation attacks, has been patched in Android 5.0...
View ArticleZIMPERIUM discovered “DoubleDirect” MitM Attack
The new network attack vector “DoubleDirect” MitM Attack, Targets Android, iOS and OS X Users Security researchers have discovered a new type of “Man-in-the-Middle” (MitM) attack in the wild targeting...
View ArticleA pirated version of the Assassin’s Creed application for Android is bundled...
Overview Assassin’s Creed is a popular, open-world series of adventure games available in various iterations on the XBOX, PlayStation, PC and other gaming platforms. There is also a premium Assassin’s...
View ArticleAppie – Android Pen-testing Portable Integrated Environment
Appie is a software package that has been pre-configured to function as an Android Pentesting Environment.It is completely portable and can be carried on USB stick.This is a one stop answer for all...
View ArticleHackers Can Remotely Install Malware Apps to Your Android Device
Security researchers have warned of a pair of vulnerabilities in the Google Play Store that could allow cyber crooks to install and launch malicious applications remotely on Android devices. Tod...
View ArticleAndroid to Become ‘Workhorse’ of Cyber-crime
PARIS — As of the end of 2014, 16 million mobile devices worldwide have been infected by malicious software, estimated Alcatel-Lucent’s security arm, Motive Security Labs, in its latest security...
View ArticleDroidStealth | Android Encryption Tool with Stealth Capabilities
We all have Internet-connected smartphones in our pockets, but it’s very hard to find a place on Internet to feel secure and private. No doubt, there is data Encryption on cell phones, but what’s...
View ArticleCIA Has Been Hacking iPhone and iPad Encryption Security Since 2006
Security researchers at the Central Intelligence Agency (CIA) have worked for almost decade to target security keys used to encrypt data stored on Apple devices in order to break the system. Citing...
View ArticleMobile Tracking and Device Identification via Sensor Fingerprinting
New mobile attack vector allows cyber attackers to track and identify mobile victims via sensors fingerprinting Cyber Security researchers discovered a new techniques and methodology of privacy...
View Article
More Pages to Explore .....