![mobile](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/22112726/mobile_danger-1400-400x200.jpg)
New method to safeguard against mobile account takeovers
Computer science researchers have developed a new way to identify security weaknesses that leave people vulnerable to account takeover attacks, where an attacker gains …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111204/twitter-android2-400x200.png)
Researcher releases PoC rooting app that exploits recent Android zero-day
Late last month Google Project Zero researcher Maddie Stone detailed a zero-day Android privilege escalation vulnerability (CVE-2019-2215) and revealed that it is actively …
![Android explode](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103322/android-explode-400x200.jpg)
Unpatched Android flaw exploited by attackers, impacts Pixel, Samsung, Xiaomi devices
A privilege escalation vulnerability affecting phones running Android 8.x and later is being leveraged by attackers in the wild, Google has revealed. Interestingly enough, the …
![Xiaomi](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094657/xiaomi-400x200.jpg)
Vulnerability found in Guard Provider, Xiaomi’s pre-installed security app
Check Point Research discovered a vulnerability in one of the preinstalled apps on devices manufactured by one of the world’s biggest mobile vendors, Xiaomi. The vulnerability …
![Xiaomi](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110559/xiaomi-400x200.jpg)
Xiaomi smartphones come equipped with backdoor
When you buy a new mobile device with certain apps already pre-installed on, you’re effectively forced to trust that the device maker or reseller (depending on who …
![Fitbit](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194543/fitbit-watches-400x200.jpg)
Security and privacy issues plague wearable fitness tracking devices
A new report is describing major security and privacy issues in several leading wearable fitness tracking devices and accompanying mobile applications. The research examined …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD