Chinese-made GPS tracker that have no internet connectivity but use a SIM card to connect to a cell network are bought in bulk, rebranded, and resold by a number of companies worldwide. UK cyber-security experts are calling for an immediate recall of a GPS tracker used as a panic alarm for elderly patients, monitoring...Continue Reading
Phishing attack hacker are abusing the notifications and push APIs on Android devices to send spam alerts that are customized to look like a missed call. Both APIs are used on mobile devices for push notifications – short messages intended to re-engage the user. Messages can be triggered by a local application or server. ...Continue Reading
Smartphone players often rely but get frustrated with the free mobile gaming mechanism, making them wait for a long period of time to advance and unlock some of it’s features. With this in mind, players end up finding ways to progress into the game. Now this is where the hackers come in. Popular mobile games...Continue Reading
It was a very unpleasant Friday, at approximately 12:45 PM Pacific Standard Time, Twitter handle @jack – confirmed to be of Jack Dorsey’s (Twitter’s Chief Executive Officer) account, began sending out a series of highly inappropriate and notably disturbing tweets. They included a mix of racial slurs, obscenity, profanity, nazi-inclined campaigns, and even a bomb...Continue Reading
Lots of smartphone manufacturers are tricked into installing a malware trojan known as Triada, who masquerades as a software vendor believing this will help them add features to the standard Android OS. This Triada malware is designed to put spam and ads on their device. The creators of Triada then collects revenue from the ads...Continue Reading
The campaign, labeled “Soula”, collects information via a spoofed login screen of one of the country’s leading search engines that pops up over the original webpage. It sends the logged credentials to the attackers’ server even without accurate data confirmation, leading researchers to think that the cybercriminals are at research and information-gathering stage. ...Continue Reading
Security Researchers recently discovered a new malware trojan called GolfSpythat targets android phone users in the Middle East and was designed to steal personal information and potentially take control over mobile devices.The malware’s cyberespionage campaign was named “Bouncing Golf”based on the malware’s code in the package named “golf.”This info-stealing malware is known for its wide...Continue Reading
A Wisconsin-based company named EatStreetis one of many successful businesses around US when it comes to online food ordering and delivery services. With more than 100,000 installs in the company’s android app on Google Play store, EatStreet is one of the leading online and mobile food ordering service currently servicing over 15,000 restaurants in more...Continue Reading
Summary Triada Trojan has been found in the firmware of various low-cost Android devices, which could be used to steal sensitive data and run cyber espionage modules. Analysis : First seen in March 2016 and labelled as the most advance mobile Trojan during that time specifically engineered as Android banking trojan. Android system images were...Continue Reading
Qualcomm chipsets are generally the processor of choice for many smartphone users, owing to the firm’s powerful graphics hardware and developer-friendly nature. It’s not immune to security flaws though, and its latest vulnerability is a big one. Security researchers discovered the flaw last year, allowing cyber-criminals to gain private data and security keys in...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.