Please turn on your JavaScript for this page to function normally.
eyes
How widespread is mercenary spyware? More than you think

A targeted hunt on 2,500 mobile devices for indicators of compromise associated with mercenary spyware has revealed that its use is not as rare as one would hope. The results …

power
Why juice jacking is overhyped

Travelers should avoid public USB charging stations at airports, hotels, and other venues, as they may harbor malicious software. Designed for both data and power …

mobile device
Outmaneuvering cybercriminals by recognizing mobile phishing threats’ telltale markers

Preventative medicine has long been recognized as a vital approach in safeguarding our physical health. We take a variety of tests and assessments so that doctors can uncover …

Eavesdropping scam: A new scam call tactic

Hiya has detected the newest scam call tactic, the eavesdropping scam. The new scam aims to get users to call back by leaving vague voicemail messages where an unknown voice …

Android explode
New Rowhammer attack can be used to hack Android devices remotely

Researchers from Vrije Universiteit in Amsterdam have demonstrated that it is possible to use a Rowhammer attack to remotely hack Android phones. What is a Rowhammer attack? …

Phone unlock pattern
Android unlock patterns are a boon for shoulder surfing attackers

The “swiping” unlock patterns typical for Android devices are considerably easier for attackers to discern than PIN combinations. In fact, after only one …

smartphone tools
Hacking smartphones with malicious replacement parts

Smartphone users can now add a new entry to the list of things they need to worry about: their phones being compromised via replacement parts. A group of researchers from …

Apple
Decryption key for Apple iOS Secure Enclave Processor firmware revealed

A hacker that goes by the handle “xerub” has apparently figured out the decryption key for Apple’s Secure Enclave Processor (SEP) firmware, and made it …

Samsung Galaxy S8
Samsung Galaxy S8 iris scanner can be fooled with a printed photo

After demonstrating how easily Apple’s Touch ID can be fooled with a user fingerprint photographed from a glass surface, Chaos Computer Club (CCC) hacker …

Samsung Galaxy S5
Remote attackers can force Samsung Galaxy devices into never-ending reboot loop

A single SMS can force Samsung Galaxy devices into a crash and reboot loop, and leave the owner with no other option than to reset it to factory settings and lose all data …

pattern lock
Your smartphone’s unlock pattern or PIN can be easily cracked

Locking your smartphone or tablet when not in use is a great idea, but you should be aware that shoulder-surfing individuals can easily discover the PIN or pattern you use to …

Phone
Hacking smartphones via voice commands hidden in YouTube videos

A group of researchers from Georgetown University and UC Berkeley have demonstrated how voice commands hidden in YouTube videos can be used by malicious attackers to …

Don't miss

Cybersecurity news