Quantcast
Channel: Mobile Security – 0xicf
Browsing all 30 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Most popular Android apps open users to MITM attacks

SSL Vulnerabilities: Who listens when Android applications talk? Summary The Android ecosystem is all about communicating, and right now it’s screaming for help. That’s because SSL vulnerabilities and...

View Article



Image may be NSFW.
Clik here to view.

ZIMPERIUM released zANTI 2.0

“After 3 years of work, we are excited to release zANTI 2.0 – completely free for community usage…” said Zuk Avraham, Zimperium co-founder and CEO. Android Network Toolkit (zANTI 2.0) is an...

View Article

Image may be NSFW.
Clik here to view.

AppBuyer – New iOS Malware Steals Apple ID and Password to Buy Apps

  Palo Alto Networks recently found and analyzed a new iOS malware affecting jail-broken iOS devices in the wild. The malware will connect to C&C server, download and execute malicious executable...

View Article

Image may be NSFW.
Clik here to view.

Remote exploit vulnerability in bash CVE-2014-6271

  A remotely exploitable vulnerability has been discovered by Stephane Chazelas in bash on Linux and it is unpleasant. The vulnerability has the CVE identifier CVE-2014-6271 and has been given the...

View Article

Image may be NSFW.
Clik here to view.

What The Massive Shellshock Exploit Means For You

The big tech news of the moment, and probably of the year or decade, is the revelation about a massive security hole in something called Bash, which is an arcane bit of geek code which is installed on...

View Article


Image may be NSFW.
Clik here to view.

UNHcFREG researchers disclosed flaws dozen Android apps

Researchers from the UNHcFREG (University of New Haven) is publishing on YouTube a series of videos to disclose vulnerabilities in a dozen Android apps. Experts at the University of New Haven’s Cyber...

View Article

Image may be NSFW.
Clik here to view.

New attack hides stealthy Android malware in images

A new technique that allows attackers to hide encrypted malicious Android applications inside images could be used to evade detection by antivirus products and possibly Google Play’s own malware...

View Article

Image may be NSFW.
Clik here to view.

Apple iOS 8 and Yosemite: The latest privacy invasion

Apple’s latest operating systems, Mac OS X Yosemite and iOS 8, both transmit your search terms back to Apple by default and it’s difficult to disable. Apple’s latest operating systems, Mac OS X...

View Article


Image may be NSFW.
Clik here to view.

Zero Day Hole found in Samsung FindMyMobile (CVE-2014-8346)

About FindMyMobile Samsung FindMyMobile is a mobile web-service that provides samsung users different features to locate lost device, lock a device remotely so that no one else can use the device, or...

View Article


Image may be NSFW.
Clik here to view.

Apple disabling the SSL3 support in Push Notification Service

Apple are about to disable SSL3 support in Apple Push Notification Service at Wednesday, October 29. Developers experiencing issues with Provider Communication interface in the development environment...

View Article

Image may be NSFW.
Clik here to view.

Masque Attack — New iOS Vulnerability Allows Hackers to Replace Apps with...

  Android have been a long time target for cyber criminals, but now it seems that they have turned their way towards iOS devices. Apple always says that hacking their devices is too difficult for...

View Article

Image may be NSFW.
Clik here to view.

CVE-2014-7911: Billions of Android Devices Vulnerable to Privilege Escalation...

  A security weakness in Android mobile operating system versions below 5.0 that puts potentially every Android device at risk for privilege escalation attacks, has been patched in Android 5.0...

View Article

Image may be NSFW.
Clik here to view.

ZIMPERIUM discovered “DoubleDirect” MitM Attack

The new network attack vector “DoubleDirect” MitM Attack, Targets Android, iOS and OS X Users Security researchers have discovered a new type of “Man-in-the-Middle” (MitM) attack in the wild targeting...

View Article


Image may be NSFW.
Clik here to view.

A pirated version of the Assassin’s Creed application for Android is bundled...

Overview Assassin’s Creed is a popular, open-world series of adventure games available in various iterations on the XBOX, PlayStation, PC and other gaming platforms. There is also a premium Assassin’s...

View Article

Image may be NSFW.
Clik here to view.

Appie – Android Pen-testing Portable Integrated Environment

  Appie is a software package that has been pre-configured to function as an Android Pentesting Environment.It is completely portable and can be carried on USB stick.This is a one stop answer for all...

View Article


Image may be NSFW.
Clik here to view.

Hackers Can Remotely Install Malware Apps to Your Android Device

Security researchers have warned of a pair of vulnerabilities in the Google Play Store that could allow cyber crooks to install and launch malicious applications remotely on Android devices. Tod...

View Article

Image may be NSFW.
Clik here to view.

Android to Become ‘Workhorse’ of Cyber-crime

PARIS — As of the end of 2014, 16 million mobile devices worldwide have been infected by malicious software, estimated Alcatel-Lucent’s security arm, Motive Security Labs, in its latest security...

View Article


Image may be NSFW.
Clik here to view.

DroidStealth | Android Encryption Tool with Stealth Capabilities

  We all have Internet-connected smartphones in our pockets, but it’s very hard to find a place on Internet to feel secure and private. No doubt, there is data Encryption on cell phones, but what’s...

View Article

Image may be NSFW.
Clik here to view.

CIA Has Been Hacking iPhone and iPad Encryption Security Since 2006

Security researchers at the Central Intelligence Agency (CIA) have worked for almost decade to target security keys used to encrypt data stored on Apple devices in order to break the system.   Citing...

View Article

Image may be NSFW.
Clik here to view.

Mobile Tracking and Device Identification via Sensor Fingerprinting

New mobile attack vector allows cyber attackers to track and identify mobile victims via sensors fingerprinting   Cyber Security researchers discovered a new techniques and methodology of privacy...

View Article
Browsing all 30 articles
Browse latest View live




Latest Images