- Mobil -

Last update 09.10.17 12:35:47

Home  Analysis  Android  Apple  APT  Attack  BigBrothers  BotNet  Congress  Crime  Crypto  Cryptocurrency  Cyber  CyberCrime  CyberSpy  CyberWar  Exploit  Forensics  Hacking  ICS  Incindent  iOS  IT  IoT  Mobil  OS  Phishing  Privacy  Ransomware  Safety  Security  Social  Spam  Vulnerebility  Virus  EN  List  Czech Press  Page


User Confidence in Smartphone Security Abysmal



19.11.18Smartphones: A Double-edged Sword for TerroristsMobilPBWCZ.CZ
14.11.18New Cloudflare DNS App Brings Increased Privacy for Mobile DevicesMobilPBWCZ.CZ
31.8.18Hackers Hit Air Canada Mobile AppMobilPBWCZ.CZ
2.8.18A study of car sharing appsMobilPBWCZ.CZ
19.7.18Researchers show how to manipulate road navigation systems with low-cost devicesMobilPBWCZ.CZ
19.7.18How crooks conduct Money Laundering operations through mobile gamesMobilPBWCZ.CZ
3.7.18A Samsung Texting App bug is sending random photos to contactsMobilPBWCZ.CZ

One more reason to hate your cellphone battery when it sends private data to the bad actors

21.6.18Thousands of Mobile Apps Leak Data from Firebase DatabasesMobilPBWCZ.CZ
16.4.18TrueMove H, the biggest 4G mobile operator in Thailand suffered a data leakMobilPBWCZ.CZ
13.3.18Blocking of Broadcom-Qualcomm Tie-up Highlights 5G Security FearsMobilPBWCZ.CZ
10.3.18 Mobile malware evolution 17MobilPBWCZ.CZ
9.3.18Mobile Malware Attacks Surged in 17: KasperskyMobilPBWCZ.CZ
7.3.18 New 4G LTE Network Attacks Let Hackers Spy, Track, Spoof and SpamMobilPBWCZ.CZ
6.3.18Researchers Devise New Attacks Against 4G LTE Mobile NetworksMobilPBWCZ.CZ
6.3.18Mobile Banking Trojans Targeting Crypto-CurrenciesMobilPBWCZ.CZ
5.3.18 New attacks on 4G LTE networks can allow to spy on users and spoof emergency alertsMobilPBWCZ.CZ
20.2.18SIM Hijacking – T-Mobile customers were victims an info disclosure exploitMobilPBWCZ.CZ
7.2.18The Argument Against a Mobile Device Backdoor for GovernmentMobilPBWCZ.CZ
27.1.18PCI Council Introduces New Standard for Mobile Card PaymentsMobilPBWCZ.CZ
19.1.18Booby-Trapped Messaging Apps Used for Spying: ResearchersMobilPBWCZ.CZ
11.1.18Security Flaws Found in Majority of SCADA Mobile AppsMobilPBWCZ.CZ
1.1.18 WeChat is set to become China’s official electronic ID systemMobilPBWCZ.CZ
18.12.17French Aerospace Giant Thales Acquires SIM Maker GemaltoMobilPBWCZ.CZ
8.12.17Major Banking Applications were found vulnerable to MiTM attacks over SSLMobilPBWCZ.CZ
8.12.17Massive Breach Exposes Keyboard App that Collects Personal Data On Its 31 Million UsersMobilPBWCZ.CZ
6.12.17Mobile Response to Security Alerts Allows Immediate Action Anywhere, AnytimeMobilPBWCZ.CZ
1.12.17Police vs Privacy: US Supreme Court Looks at Cell Phone TrackingMobilPBWCZ.CZ
29.11.17 Samsung Adopts Bugcrowd to Manage Mobile Security Rewards ProgramMobilPBWCZ.CZ
29.11.17Privacy Rights in Balance as Supreme Court Hears Cellphone Tracking CaseMobilPBWCZ.CZ
15.11.17A Backdoor in OnePlus devices allows root access without unlocking bootloaderMobilPBWCZ.CZ
14.11.17Cloudflare Acquires Mobile App Specialist NeumobMobilPBWCZ.CZ
13.11.17Phony WhatsApp used Unicode to slip under Google’s radarMobilPBWCZ.CZ
9.11.17Twilio Credentials Hardcoded in Mobile Apps Expose Calls, TextsMobilPBWCZ.CZ
15.10.17 High-Tech Bridge Launches Free Service for Testing Mobile AppsMobilPBWCZ.CZ
10.10.174G/5G Wireless Networks as Vulnerable as WiFi and putting SmartCities at RiskMobilPBWCZ.CZ
4.10.17Which are most frequently blacklisted apps by enterprises?MobilPBWCZ.CZ
19.9.17Researchers demonstrate how to steal Bitcoin by exploiting SS7 issuesMobilPBWCZ.CZ
6.9.17Boffins found multiple flaws in Mobile Bootloaders using custom tool BootStompMobilPBWCZ.CZ
21.8.17Hackers Can Hijack Phones via Replacement Screens: Researchers MobilPBWCZ.CZ
11.8.17Cyberattack Leaves Millions Without Mobile Phone Service in Venezuela MobilPBWCZ.CZ
2.8.17Amazon Suspends Sales of BLU Smartphones Over Security, Privacy Concerns MobilPBWCZ.CZ
23.7.17 THN Weekly Roundup — 10 Most Important Stories You Shouldn't MissMobilPBWCZ.CZ
20.7.17Black Hat is coming and with it a good reason to update your “Broadcom-based” devicesMobilPBWCZ.CZ
10.7.17 Satellite Phone Encryption Calls Can be Cracked in Fractions of a SecondMobilPBWCZ.CZ
10.7.17Researchers Decrypt Satellite Phone Communication in Real-TimeMobilPBWCZ.CZ
4.7.17How to chain flaws in Lenovo VIBE smartphones to gain root privilegesMobilPBWCZ.CZ
3.7.17Local Root Exploit Found on Lenovo Smartphone MobilPBWCZ.CZ
11.6.17Critical kernel command line injection flaw found in Motorola handsets MOTO G4, G5MobilPBWCZ.CZ
1.6.17Enterprise Mobile Apps Expose Sensitive Data via Backend Systems MobilPBWCZ.CZ
25.5.17Samsung Investigating Galaxy S8 'Iris Hack' MobilPBWCZ.CZ
24.5.17Hackers Defeat Samsung Galaxy S8 Iris Scanner MobilPBWCZ.CZ

CEOs and Coffee Shops Are Mobile Computing's Biggest Risks: Report


Verizon Messages App Allowed XSS Attacks Over SMS

22.5.17 Ztorg: money for infecting your smartphoneMobilPBWCZ.CZ
12.5.17Dutch Police Seize Another Company that Sells PGP-Encrypted Blackberry PhonesMobilPBWCZ.CZ
5.5.17Hackers are stealing money from Bank accounts in Germany by exploiting flaws in #SS7 protocolMobilPBWCZ.CZ
5.5.207Hackers Exploit SS7 Flaws to Loot Bank Accounts MobilPBWCZ.CZ
4.5.17Real-World SS7 Attack — Hackers Are Stealing Money From Bank AccountsMobilPBWCZ.CZ
4.5.17Hundreds of Apps Using Ultrasonic Signals to Silently Track Smartphone UsersMobilPBWCZ.CZ
29.4.17 Insecure Apps that Open Ports Leave Millions of Smartphones at Risk of HackingMobilPBWCZ.CZ
27.4.17Security vulnerabilities in Hyundai Blue Link mobile app allowed hackers to steal vehiclesMobilPBWCZ.CZ
20.4.17Exfiltrating data from laptop and smartphones via ambient light sensorsMobilPBWCZ.CZ
11.4.17Hackers Can Steal Your Passwords Just by Monitoring SmartPhone SensorsMobilPBWCZ.CZ
5.4.17Millions Of Smartphones Using Broadcom Wi-Fi Chip Can Be Hacked Over-the-AirMobilPBWCZ.CZ
31.3.17Samsung Galaxy S8 facial recognition system to unlock the device can be bypassed with a photoMobilPBWCZ.CZ
13.3.17Flaws in MAC address randomization implemented by vendors allow mobile trackingMobilPBWCZ.CZ
11.3.17 Ennetcom – Dutch Police confirmed to have decrypted BlackBerry PGP messages in a criminal caseMobilPBWCZ.CZ
10.3.17MAC Randomization Flaws Expose Phones to Tracking MobilPBWCZ.CZ
3.3.17Backdoor Found in DBLTek GSM Gateways MobilPBWCZ.CZ
2.3.17Mobile malware evolution 16MobilPBWCZ.CZ
28.2.17Prisons and Courts Bill allows mobile networks to deploy IMSI catchers outside of prisonsMobilPBWCZ.CZ
18.2.17Mobile apps and stealing a connected carMobilPBWCZ.CZ
14.2.17Senators want more info on Trump’s personal phone and its defenseMobilPBWCZ.CZ
14.2.17 Senators Launch Query on Trump's Smartphone Security MobilPBWCZ.CZ
10.2.17Every website that uses jQuery Mobile, and has any open redirect is vulnerable to XSSMobilPBWCZ.CZ
4.2.17Hacker leaked tools stolen from mobile forensics company CellebriteMobilPBWCZ.CZ
13.1.17Phone-Hacking Firm Cellebrite Got Hacked; 900GB Of Data StolenMobilPBWCZ.CZ
13.1.17Israeli mobile phone data extraction company Cellebrite was hackedMobilPBWCZ.CZ
27.11.16The Most Secure Smartphones – Holiday EditionMobilPBWCZ.CZ
8.11.16 Technical analysis of the Locker virus on mobile phonesMobilPBWCZ.CZ
8.11.16 Abusing protocols in LTE networks to knock mobile devices off networksMobilPBWCZ.CZ
7.11.16Disassembling a Mobile Trojan AttackMobilPBWCZ.CZ
4.11.16 Wi-Fi can be turned into IMSI Catcher to Track Cell Phone Users EverywhereMobilPBWCZ.CZ
26.10.16Hacking Firmware from Mobile Phone Hacking Company Leaked OnlineMobilPBWCZ.CZ
25.10.16Hacking GSM A5 crypto algorithm by using commodity hardwareMobilPBWCZ.CZ
24.10.16InTheCyber discovered a serious flaw in messaging systemsMobilPBWCZ.CZ
17.10.16UK Police purchased IMSI-catcher technology for mobile surveillanceMobilPBWCZ.CZ
8.10.16 WiFox mobile app shows names and passwords for Wi-Fi airports networks worldwideMobilPBWCZ.CZ
19.5.16Japanese Docomo makes its smartphone covertly trackableMobilPBWCZ.CZ
10.5.16FCC takes initiative to Speed Up Mobile Security UpdatesMobilPBWCZ.CZ
21.4.16Encrypted Smartphone Network Seized by Dutch Police for Criminal InvestigationMobilPBWCZ.CZ
15.4.16Canadian Police obtained Master Key to Crack BlackBerry Messenger EncryptionMobilPBWCZ.CZ
15.4.16 Report: Nothing useful found on San Bernardino Shooter's iPhoneMobilPBWCZ.CZ
13.4.16Hacking Samsung Galaxy via Modem interface exposed via USBMobilPBWCZ.CZ
8.4.16Google may adopt Apple's Swift Programming Language for AndroidMobilPBWCZ.CZ
30.3.16Following revelations on Paris attacks, US lawmakers target burner phonesMobilPBWCZ.CZ
26.3.16 New Bill targets Anonymous Prepaid 'Burner' phones by requiring RegistrationMobilPBWCZ.CZ
11.3.16Google Android N Preview — 6 Cool Features That You Should KnowMobilPBWCZ.CZ
11.3.16Triada Trojan the most sophisticated mobile malware seen to dateMobilPBWCZ.CZ
11.3.16How to hack mobile phones embedded fingerprint sensor using 2D Printed fingerprintsMobilPBWCZ.CZ
6.3.16 SIM swap fraud cases force bank to improve securityMobilPBWCZ.CZ
5.3.16New exploit steals secret cryptographic keys from mobile devicesMobilPBWCZ.CZ
3.3.16Attack on Zygote: a new twist in the evolution of mobile threatsMobilPBWCZ.CZ
23.2.16Mobile malware evolution 15MobilPBWCZ.CZ
12.2.16New York Police Used Cell Phone Spying Tool Over 1000 Times Without WarrantMobilPBWCZ.CZ