Category

Mobile Apps

Mobile Apps Page 5

Social Engineering: Cyber Love gone Phishing Intel

Social Engineering: Cyber Love gone Phishing Intel

Most users nowadays are still not aware that Social Engineering is dangerous and rampant as ever. It is a technique still being utilized by cyber criminals and intelligence agents. Yes, that’s right Intelligence Officers are trained to be good at it in order to phish for information. In this digital age, the medium of communication...
Continue Reading
Cheap Android Smartphones discovered to have pre-installed Malware

Cheap Android Smartphones discovered to have pre-installed Malware

Unfortunately for Android smartphone users coming from developing countries with usually low privacy protections, a cheap smartphone could come with a hidden cost: Low-end Android smartphone devices mostly sold at developing markets such as Egypt, Brazil, South Africa, Myanmar, etc., contain pre-installed malware. The malware to blame is com.rock.gota, but it masks itself quite ingeniously...
Continue Reading
Money Laundering via Mobile Gaming

Money Laundering via Mobile Gaming

For anyone who has played many of the popular smartphone games will definitely agree, the need for in-game currency is essential. Most of the players are hooked upon the notion that in order to advance substantially in the game is to use or purchase their currency. Smartphone gamers often rely but get frustrated with the...
Continue Reading
social media accounts

Polar Fitness App Data Breach

A popular trend in the mobile app market that recently suffered a data breach is involving fitness apps. Nike Plus, Strava, adidas miCoach and a slew of other apps have been developed to better track the fitness regiments of people globally. Polar, another popular fitness app, tried to up the ante by adding a feature...
Continue Reading
Google is Tracking Users Even without Location History

Google is Tracking Users Even without Location History

Just when you thought you have disabled location tracking since you have turned off your location settings and history, you were wrong. According to a report by Associated Press last Monday, even though you’ve already disabled your Location History, Google will still be able to track you down – every single time. Google said that...
Continue Reading
Apple iOS 12 Just Got Jailbroken

Apple iOS 12 Just Got Jailbroken

Yet another terrible news for Apple. Pangu – The Chinese Hacking Team is back and once again and surprised everyone by hacking the just released iOS12 on the iPhone XS. Well, that was awkwardly fast. The Pangu Jailbreak Team has been dormant for a while. Their last jailbreak was the iOS9 back in October 2015....
Continue Reading
New Malware Can Turn Android Devices into Hidden Proxies

New Malware Can Turn Android Devices into Hidden Proxies

Another Android malware named TimpDoor has been found by security specialists. The malware is being circulated as a major aspect of a phishing effort and is being sent to exploited people’s SMS messages. The aggressors behind the battle trap exploited people into downloading and introducing a phony voice-message application that contains TimpDoor. Once the malware-bound...
Continue Reading
Fraudulent Bank Apps

Fraudulent Bank Apps Possibly Acquired Thousands of Customer Data

Fraudulent applications of SBI (State Bank of India), ICICI India Ltd., Axis Bank, Citi and other large banks are accessible on Google Play, which may have stolen information of thousands of bank clients, asserts a report by an IT security firm. These phony android applications have the logo of individual banks which makes it troublesome...
Continue Reading
Mobile Phone Security

Mobile Phone Security: All You Need to Know

In the advent of 21 Century mobile phones are gaining its popularity which distinguish from “featured” phones by their hardware capabilities and extensive mobile operating systems, that facilitate software, internet and multimedia functionality of which includes music, video, cameras and gaming, alongside core phone functions such as voice calls and text messaging. Mobile phones are...
Continue Reading
USB Type C – A Hackers Gateway

USB Type C – A Hackers Gateway

Plugging in the power — or at least what you think is power — to a USB-C powered laptop can connect your computer, and the valuable personal data on it, directly to hackers. Your personal financial information, passwords and documents stored on the laptop could help a cyber-criminal steal your identity. The laptop may even...
Continue Reading
1 3 4 5 6