- Mobil -

Last update 09.10.17 12:35:47



16.2.19

Threatpost Poll: Over Half of Firms Asked Struggle with Mobile Security

Mobil

Threatpost

4.2.19

First Hacker Convicted of 'SIM Swapping' Attack Gets 10 Years in Prison

Mobil

Thehackernews

1.2.19

Researchers reveal new privacy attack against 3G, 4G, and 5G mobile users

Mobil

Net-security

10.1.19

The Promise and Peril of 5G

Mobil Threatpost

7.1.19

BlackBerry Offers Its Security Technology to IoT Device Makers

Mobil Securityweek

26.11.18

User Confidence in Smartphone Security Abysmal

Mobil

Threatpost

19.11.18Smartphones: A Double-edged Sword for TerroristsMobil PBWCZ.CZ
14.11.18New Cloudflare DNS App Brings Increased Privacy for Mobile DevicesMobil PBWCZ.CZ
31.8.18Hackers Hit Air Canada Mobile AppMobil PBWCZ.CZ
2.8.18A study of car sharing appsMobil PBWCZ.CZ
19.7.18Researchers show how to manipulate road navigation systems with low-cost devicesMobil PBWCZ.CZ
19.7.18How crooks conduct Money Laundering operations through mobile gamesMobil PBWCZ.CZ
3.7.18A Samsung Texting App bug is sending random photos to contactsMobil PBWCZ.CZ
26.6.18

One more reason to hate your cellphone battery when it sends private data to the bad actors

Mobil PBWCZ.CZ
21.6.18Thousands of Mobile Apps Leak Data from Firebase DatabasesMobil PBWCZ.CZ
16.4.18TrueMove H, the biggest 4G mobile operator in Thailand suffered a data leakMobil PBWCZ.CZ
13.3.18Blocking of Broadcom-Qualcomm Tie-up Highlights 5G Security FearsMobil PBWCZ.CZ
10.3.18 Mobile malware evolution 17Mobil PBWCZ.CZ
9.3.18Mobile Malware Attacks Surged in 17: KasperskyMobil PBWCZ.CZ
7.3.18 New 4G LTE Network Attacks Let Hackers Spy, Track, Spoof and SpamMobil PBWCZ.CZ
6.3.18Researchers Devise New Attacks Against 4G LTE Mobile NetworksMobil PBWCZ.CZ
6.3.18Mobile Banking Trojans Targeting Crypto-CurrenciesMobil PBWCZ.CZ
5.3.18 New attacks on 4G LTE networks can allow to spy on users and spoof emergency alertsMobil PBWCZ.CZ
20.2.18SIM Hijacking – T-Mobile customers were victims an info disclosure exploitMobil PBWCZ.CZ
7.2.18The Argument Against a Mobile Device Backdoor for GovernmentMobil PBWCZ.CZ
27.1.18PCI Council Introduces New Standard for Mobile Card PaymentsMobil PBWCZ.CZ
19.1.18Booby-Trapped Messaging Apps Used for Spying: ResearchersMobil PBWCZ.CZ
11.1.18Security Flaws Found in Majority of SCADA Mobile AppsMobil PBWCZ.CZ
1.1.18 WeChat is set to become China’s official electronic ID systemMobil PBWCZ.CZ
18.12.17French Aerospace Giant Thales Acquires SIM Maker GemaltoMobil PBWCZ.CZ
8.12.17Major Banking Applications were found vulnerable to MiTM attacks over SSLMobil PBWCZ.CZ
8.12.17Massive Breach Exposes Keyboard App that Collects Personal Data On Its 31 Million UsersMobil PBWCZ.CZ
6.12.17Mobile Response to Security Alerts Allows Immediate Action Anywhere, AnytimeMobil PBWCZ.CZ
1.12.17Police vs Privacy: US Supreme Court Looks at Cell Phone TrackingMobil PBWCZ.CZ
29.11.17 Samsung Adopts Bugcrowd to Manage Mobile Security Rewards ProgramMobil PBWCZ.CZ
29.11.17Privacy Rights in Balance as Supreme Court Hears Cellphone Tracking CaseMobil PBWCZ.CZ
15.11.17A Backdoor in OnePlus devices allows root access without unlocking bootloaderMobil PBWCZ.CZ
14.11.17Cloudflare Acquires Mobile App Specialist NeumobMobil PBWCZ.CZ
13.11.17Phony WhatsApp used Unicode to slip under Google’s radarMobil PBWCZ.CZ
9.11.17Twilio Credentials Hardcoded in Mobile Apps Expose Calls, TextsMobil PBWCZ.CZ
15.10.17 High-Tech Bridge Launches Free Service for Testing Mobile AppsMobil PBWCZ.CZ
10.10.174G/5G Wireless Networks as Vulnerable as WiFi and putting SmartCities at RiskMobil PBWCZ.CZ
4.10.17Which are most frequently blacklisted apps by enterprises?Mobil PBWCZ.CZ
19.9.17Researchers demonstrate how to steal Bitcoin by exploiting SS7 issuesMobil PBWCZ.CZ
6.9.17Boffins found multiple flaws in Mobile Bootloaders using custom tool BootStompMobil PBWCZ.CZ
21.8.17Hackers Can Hijack Phones via Replacement Screens: Researchers Mobil PBWCZ.CZ
11.8.17Cyberattack Leaves Millions Without Mobile Phone Service in Venezuela Mobil PBWCZ.CZ
2.8.17Amazon Suspends Sales of BLU Smartphones Over Security, Privacy Concerns Mobil PBWCZ.CZ
23.7.17 THN Weekly Roundup — 10 Most Important Stories You Shouldn't MissMobil PBWCZ.CZ
20.7.17Black Hat is coming and with it a good reason to update your “Broadcom-based” devicesMobil PBWCZ.CZ
10.7.17 Satellite Phone Encryption Calls Can be Cracked in Fractions of a SecondMobil PBWCZ.CZ
10.7.17Researchers Decrypt Satellite Phone Communication in Real-TimeMobil PBWCZ.CZ
4.7.17How to chain flaws in Lenovo VIBE smartphones to gain root privilegesMobil PBWCZ.CZ
3.7.17Local Root Exploit Found on Lenovo Smartphone Mobil PBWCZ.CZ
11.6.17Critical kernel command line injection flaw found in Motorola handsets MOTO G4, G5Mobil PBWCZ.CZ
1.6.17Enterprise Mobile Apps Expose Sensitive Data via Backend Systems Mobil PBWCZ.CZ
25.5.17Samsung Investigating Galaxy S8 'Iris Hack' Mobil PBWCZ.CZ
24.5.17Hackers Defeat Samsung Galaxy S8 Iris Scanner Mobil PBWCZ.CZ
24.5.17

CEOs and Coffee Shops Are Mobile Computing's Biggest Risks: Report

Mobil PBWCZ.CZ
23.5.17

Verizon Messages App Allowed XSS Attacks Over SMS

Mobil PBWCZ.CZ
22.5.17 Ztorg: money for infecting your smartphoneMobil PBWCZ.CZ
12.5.17Dutch Police Seize Another Company that Sells PGP-Encrypted Blackberry PhonesMobil PBWCZ.CZ
5.5.17Hackers are stealing money from Bank accounts in Germany by exploiting flaws in #SS7 protocolMobil PBWCZ.CZ
5.5.207Hackers Exploit SS7 Flaws to Loot Bank Accounts Mobil PBWCZ.CZ
4.5.17Real-World SS7 Attack — Hackers Are Stealing Money From Bank AccountsMobil PBWCZ.CZ
4.5.17Hundreds of Apps Using Ultrasonic Signals to Silently Track Smartphone UsersMobil PBWCZ.CZ
29.4.17 Insecure Apps that Open Ports Leave Millions of Smartphones at Risk of HackingMobil PBWCZ.CZ
27.4.17Security vulnerabilities in Hyundai Blue Link mobile app allowed hackers to steal vehiclesMobil PBWCZ.CZ
20.4.17Exfiltrating data from laptop and smartphones via ambient light sensorsMobil PBWCZ.CZ
11.4.17Hackers Can Steal Your Passwords Just by Monitoring SmartPhone SensorsMobil PBWCZ.CZ
5.4.17Millions Of Smartphones Using Broadcom Wi-Fi Chip Can Be Hacked Over-the-AirMobil PBWCZ.CZ
31.3.17Samsung Galaxy S8 facial recognition system to unlock the device can be bypassed with a photoMobil PBWCZ.CZ
13.3.17Flaws in MAC address randomization implemented by vendors allow mobile trackingMobil PBWCZ.CZ
11.3.17 Ennetcom – Dutch Police confirmed to have decrypted BlackBerry PGP messages in a criminal caseMobil PBWCZ.CZ
10.3.17MAC Randomization Flaws Expose Phones to Tracking Mobil PBWCZ.CZ
3.3.17Backdoor Found in DBLTek GSM Gateways Mobil PBWCZ.CZ
2.3.17Mobile malware evolution 16Mobil PBWCZ.CZ
28.2.17Prisons and Courts Bill allows mobile networks to deploy IMSI catchers outside of prisonsMobil PBWCZ.CZ
18.2.17Mobile apps and stealing a connected carMobil PBWCZ.CZ
14.2.17Senators want more info on Trump’s personal phone and its defenseMobil PBWCZ.CZ
14.2.17 Senators Launch Query on Trump's Smartphone Security Mobil PBWCZ.CZ
10.2.17Every website that uses jQuery Mobile, and has any open redirect is vulnerable to XSSMobil PBWCZ.CZ
4.2.17Hacker leaked tools stolen from mobile forensics company CellebriteMobil PBWCZ.CZ
13.1.17Phone-Hacking Firm Cellebrite Got Hacked; 900GB Of Data StolenMobil PBWCZ.CZ
13.1.17Israeli mobile phone data extraction company Cellebrite was hackedMobil PBWCZ.CZ
27.11.16The Most Secure Smartphones – Holiday EditionMobil PBWCZ.CZ
8.11.16 Technical analysis of the Locker virus on mobile phonesMobil PBWCZ.CZ
8.11.16 Abusing protocols in LTE networks to knock mobile devices off networksMobil PBWCZ.CZ
7.11.16Disassembling a Mobile Trojan AttackMobil PBWCZ.CZ
4.11.16 Wi-Fi can be turned into IMSI Catcher to Track Cell Phone Users EverywhereMobil PBWCZ.CZ
26.10.16Hacking Firmware from Mobile Phone Hacking Company Leaked OnlineMobil PBWCZ.CZ
25.10.16Hacking GSM A5 crypto algorithm by using commodity hardwareMobil PBWCZ.CZ
24.10.16InTheCyber discovered a serious flaw in messaging systemsMobil PBWCZ.CZ
17.10.16UK Police purchased IMSI-catcher technology for mobile surveillanceMobil PBWCZ.CZ
8.10.16 WiFox mobile app shows names and passwords for Wi-Fi airports networks worldwideMobil PBWCZ.CZ
19.5.16Japanese Docomo makes its smartphone covertly trackableMobil PBWCZ.CZ
10.5.16FCC takes initiative to Speed Up Mobile Security UpdatesMobil PBWCZ.CZ
21.4.16Encrypted Smartphone Network Seized by Dutch Police for Criminal InvestigationMobil PBWCZ.CZ
15.4.16Canadian Police obtained Master Key to Crack BlackBerry Messenger EncryptionMobil PBWCZ.CZ
15.4.16 Report: Nothing useful found on San Bernardino Shooter's iPhoneMobil PBWCZ.CZ
13.4.16Hacking Samsung Galaxy via Modem interface exposed via USBMobil PBWCZ.CZ
8.4.16Google may adopt Apple's Swift Programming Language for AndroidMobil PBWCZ.CZ
30.3.16Following revelations on Paris attacks, US lawmakers target burner phonesMobil PBWCZ.CZ
26.3.16 New Bill targets Anonymous Prepaid 'Burner' phones by requiring RegistrationMobil PBWCZ.CZ
11.3.16Google Android N Preview — 6 Cool Features That You Should KnowMobil PBWCZ.CZ
11.3.16Triada Trojan the most sophisticated mobile malware seen to dateMobil PBWCZ.CZ
11.3.16How to hack mobile phones embedded fingerprint sensor using 2D Printed fingerprintsMobil PBWCZ.CZ
6.3.16 SIM swap fraud cases force bank to improve securityMobil PBWCZ.CZ
5.3.16New exploit steals secret cryptographic keys from mobile devicesMobil PBWCZ.CZ
3.3.16Attack on Zygote: a new twist in the evolution of mobile threatsMobil PBWCZ.CZ
23.2.16Mobile malware evolution 15Mobil PBWCZ.CZ
12.2.16New York Police Used Cell Phone Spying Tool Over 1000 Times Without WarrantMobil PBWCZ.CZ