Please turn on your JavaScript for this page to function normally.
https
Proxy authentication flaw can be exploited to crack HTTPS protection

Mistakes made in the implementation of proxy authentication in a variety of operating systems and applications have resulted in security vulnerabilities that allow MitM …

Google Duo
Google Duo: Simple, encrypted, video calling app

Google Duo is a simple 1-to-1 video calling app available for Android and iOS. In order to use Google Duo all you need is your phone number, no separate account is necessary. …

bug
Kaspersky Safe Browser iOS app sports MITM SSL certificate bug

Security researcher David Coomber has unearthed a vulnerability (CVE-2016-6231) in the Kaspersky Safe Browser iOS app that effectively contradicts its name. As it turns out, …

Needle
Needle iOS security testing tool to be unveiled at Black Hat Arsenal

In a session at Black Hat USA 2016 on Wednesday, Marco Lancini, Security Consultant at MWR InfoSecurity, will demonstrate publicly for the first time a new iOS security …

Review: True Key for iOS

I’ve been using 1Password for years – both their desktop and mobile products. Altough it works fine, I was curious to see what are the alternatives I can use on my …

Pokemon GO
Pokémon GO gets full access to players’ Google account

Pokémon GO, the mobile augmented reality game that has become hugely popular in record time, brings with it a lot of unexpected dangers. Its popularity has been exploited by …

Signal
Review: Signal for iOS

Open Whisper Systems’ Signal is an encrypted voice and text communication application available for Android and iOS. The technology is built upon the …

SysSecInfo
iOS app detecting phones jailbroken by malware booted from App Store

The System and Security Info iOS app by German IT security outfit SektionEins has been pulled from Apple’s App Store less than a week after it was made available. The …

Gboard
Gboard enhances your keyboard, but what about your privacy?

Gboard is a Google app for your iPhone that lets you search and send information, GIFs, emojis and more, right from your keyboard. You can search and send anything from …

mobile devices
The fragile security of the mobile ecosystem

Mobile devices such as smartphones and tablets have become indispensable in our daily lives. In fact, in Q4 2015, smartphones accounted for around 75 percent of all mobile …

iPhone
SideStepper vulnerability can be used to install malicious apps on iOS

Check Point researchers have identified SideStepper, a vulnerability that can be used to install malicious apps on iPhones and iPads to steal login credentials and sensitive …

Apple
OS X zero day bug allows hackers to bypass system integrity protection

An OS X zero day vulnerability could allow attackers to bypass System Integrity Protection, Apple’s newest protection feature, and to escalate their privileges, simplifying …

Don't miss

Cybersecurity news