- Mobil -

Last update 09.10.17 12:35:47



12.4.19

The surveillance economy has set its sights on smartphone sensors

Mobil

Net-security

11.4.19

Large-scale SIM swap fraud

Mobil

Securelist

9.4.19

Samsung Galaxy S10 Fingerprint Sensor Duped With 3D Print

Mobil

Threatpost

8.4.19

Securing your app and driving down call center fraud

Mobil

Net-security

5.4.19

Samsung Galaxy S10 Fingerprint Scanner Tricked with 3D Print

Mobil

Bleepingcomputer

5.4.19

Financial Mobile Apps Fail to Follow Proper Security Standards

Mobil

Bleepingcomputer

5.4.19

This Preinstalled Mobile Security App Delivered Vulnerabilities, Not Protection

Mobil

Threatpost

27.3.19

Experts found 36 vulnerabilities in the LTE protocol

Mobil

Securityaffairs

21.3.19

Post-Perimeter Security: Addressing Evolving Mobile Enterprise Threats

Mobil

Threatpost

19.3.19

Mobile App Security Firm Blue Cedar Raises $17 Million

Mobil

Securityweek

19.3.19

G Suite admins can now disable SMS and voice 2FA

Mobil

Net-security

17.3.19

New Zealand Mobile Carriers Block 8chan, 4chan, and LiveLeak

Mobil

Bleepingcomputer

16.3.19

Google Now Lets G Suite Admins Disable Insecure Phone 2FA

Mobil

Bleepingcomputer

16.3.19

G Suite Admins Can Now Disable Phone 2-SV

Mobil

Securityweek

13.3.19

Users claim Samsung Galaxy S10 Face Recognition can be bypassed

Mobil

Securityaffairs

13.3.19

Network performance requirements grow in the era of 5G: Are your security processes ready?

Mobil

Net-security

12.3.19

Samsung Galaxy S10 Face Recognition Can Easily Be Bypassed

Mobil

Bleepingcomputer

6.3.19

BlackBerry Cylance Unveils Behavioral Analytics Solution

Mobil

Securityweek

5.3.19

Mobile malware evolution 2018

Mobil

Securelist

5.3.19

CrowdStrike Launches EDR Solution for Mobile Devices

Mobil

Securityweek

26.2.19

OSSPatcher: Automated mobile application patching for bugs in open source libraries

Mobil

Net-security

25.2.19

New Attacks Against 4G, 5G Mobile Networks Re-Enable IMSI Catchers

Mobil

Thehackernews

16.2.19

Threatpost Poll: Over Half of Firms Asked Struggle with Mobile Security

Mobil

Threatpost

4.2.19

First Hacker Convicted of 'SIM Swapping' Attack Gets 10 Years in Prison

Mobil

Thehackernews

1.2.19

Researchers reveal new privacy attack against 3G, 4G, and 5G mobile users

Mobil

Net-security

10.1.19

The Promise and Peril of 5G

Mobil Threatpost

7.1.19

BlackBerry Offers Its Security Technology to IoT Device Makers

Mobil Securityweek

26.11.18

User Confidence in Smartphone Security Abysmal

Mobil

Threatpost

19.11.18Smartphones: A Double-edged Sword for Terrorists Mobil PBWCZ.CZ
14.11.18New Cloudflare DNS App Brings Increased Privacy for Mobile Devices Mobil PBWCZ.CZ
31.8.18Hackers Hit Air Canada Mobile App Mobil PBWCZ.CZ
2.8.18A study of car sharing apps Mobil PBWCZ.CZ
19.7.18Researchers show how to manipulate road navigation systems with low-cost devices Mobil PBWCZ.CZ
19.7.18How crooks conduct Money Laundering operations through mobile games Mobil PBWCZ.CZ
3.7.18A Samsung Texting App bug is sending random photos to contacts Mobil PBWCZ.CZ
26.6.18

One more reason to hate your cellphone battery when it sends private data to the bad actors

Mobil PBWCZ.CZ
21.6.18Thousands of Mobile Apps Leak Data from Firebase Databases Mobil PBWCZ.CZ
16.4.18TrueMove H, the biggest 4G mobile operator in Thailand suffered a data leak Mobil PBWCZ.CZ
13.3.18Blocking of Broadcom-Qualcomm Tie-up Highlights 5G Security Fears Mobil PBWCZ.CZ
10.3.18 Mobile malware evolution 17 Mobil PBWCZ.CZ
9.3.18Mobile Malware Attacks Surged in 17: Kaspersky Mobil PBWCZ.CZ
7.3.18 New 4G LTE Network Attacks Let Hackers Spy, Track, Spoof and Spam Mobil PBWCZ.CZ
6.3.18Researchers Devise New Attacks Against 4G LTE Mobile Networks Mobil PBWCZ.CZ
6.3.18Mobile Banking Trojans Targeting Crypto-Currencies Mobil PBWCZ.CZ
5.3.18 New attacks on 4G LTE networks can allow to spy on users and spoof emergency alerts Mobil PBWCZ.CZ
20.2.18SIM Hijacking – T-Mobile customers were victims an info disclosure exploit Mobil PBWCZ.CZ
7.2.18The Argument Against a Mobile Device Backdoor for Government Mobil PBWCZ.CZ
27.1.18PCI Council Introduces New Standard for Mobile Card Payments Mobil PBWCZ.CZ
19.1.18Booby-Trapped Messaging Apps Used for Spying: Researchers Mobil PBWCZ.CZ
11.1.18Security Flaws Found in Majority of SCADA Mobile Apps Mobil PBWCZ.CZ
1.1.18 WeChat is set to become China’s official electronic ID system Mobil PBWCZ.CZ
18.12.17French Aerospace Giant Thales Acquires SIM Maker Gemalto Mobil PBWCZ.CZ
8.12.17Major Banking Applications were found vulnerable to MiTM attacks over SSL Mobil PBWCZ.CZ
8.12.17Massive Breach Exposes Keyboard App that Collects Personal Data On Its 31 Million Users Mobil PBWCZ.CZ
6.12.17Mobile Response to Security Alerts Allows Immediate Action Anywhere, Anytime Mobil PBWCZ.CZ
1.12.17Police vs Privacy: US Supreme Court Looks at Cell Phone Tracking Mobil PBWCZ.CZ
29.11.17 Samsung Adopts Bugcrowd to Manage Mobile Security Rewards Program Mobil PBWCZ.CZ
29.11.17Privacy Rights in Balance as Supreme Court Hears Cellphone Tracking Case Mobil PBWCZ.CZ
15.11.17A Backdoor in OnePlus devices allows root access without unlocking bootloader Mobil PBWCZ.CZ
14.11.17Cloudflare Acquires Mobile App Specialist Neumob Mobil PBWCZ.CZ
13.11.17Phony WhatsApp used Unicode to slip under Google’s radar Mobil PBWCZ.CZ
9.11.17Twilio Credentials Hardcoded in Mobile Apps Expose Calls, Texts Mobil PBWCZ.CZ
15.10.17 High-Tech Bridge Launches Free Service for Testing Mobile Apps Mobil PBWCZ.CZ
10.10.174G/5G Wireless Networks as Vulnerable as WiFi and putting SmartCities at Risk Mobil PBWCZ.CZ
4.10.17Which are most frequently blacklisted apps by enterprises? Mobil PBWCZ.CZ
19.9.17Researchers demonstrate how to steal Bitcoin by exploiting SS7 issues Mobil PBWCZ.CZ
6.9.17Boffins found multiple flaws in Mobile Bootloaders using custom tool BootStomp Mobil PBWCZ.CZ
21.8.17Hackers Can Hijack Phones via Replacement Screens: Researchers Mobil PBWCZ.CZ
11.8.17Cyberattack Leaves Millions Without Mobile Phone Service in Venezuela Mobil PBWCZ.CZ
2.8.17Amazon Suspends Sales of BLU Smartphones Over Security, Privacy Concerns Mobil PBWCZ.CZ
23.7.17 THN Weekly Roundup — 10 Most Important Stories You Shouldn't Miss Mobil PBWCZ.CZ
20.7.17Black Hat is coming and with it a good reason to update your “Broadcom-based” devices Mobil PBWCZ.CZ
10.7.17 Satellite Phone Encryption Calls Can be Cracked in Fractions of a Second Mobil PBWCZ.CZ
10.7.17Researchers Decrypt Satellite Phone Communication in Real-Time Mobil PBWCZ.CZ
4.7.17How to chain flaws in Lenovo VIBE smartphones to gain root privileges Mobil PBWCZ.CZ
3.7.17Local Root Exploit Found on Lenovo Smartphone Mobil PBWCZ.CZ
11.6.17Critical kernel command line injection flaw found in Motorola handsets MOTO G4, G5 Mobil PBWCZ.CZ
1.6.17Enterprise Mobile Apps Expose Sensitive Data via Backend Systems Mobil PBWCZ.CZ
25.5.17Samsung Investigating Galaxy S8 'Iris Hack' Mobil PBWCZ.CZ
24.5.17Hackers Defeat Samsung Galaxy S8 Iris Scanner Mobil PBWCZ.CZ
24.5.17

CEOs and Coffee Shops Are Mobile Computing's Biggest Risks: Report

Mobil PBWCZ.CZ
23.5.17

Verizon Messages App Allowed XSS Attacks Over SMS

Mobil PBWCZ.CZ
22.5.17 Ztorg: money for infecting your smartphone Mobil PBWCZ.CZ
12.5.17Dutch Police Seize Another Company that Sells PGP-Encrypted Blackberry Phones Mobil PBWCZ.CZ
5.5.17Hackers are stealing money from Bank accounts in Germany by exploiting flaws in #SS7 protocol Mobil PBWCZ.CZ
5.5.207Hackers Exploit SS7 Flaws to Loot Bank Accounts Mobil PBWCZ.CZ
4.5.17Real-World SS7 Attack — Hackers Are Stealing Money From Bank Accounts Mobil PBWCZ.CZ
4.5.17Hundreds of Apps Using Ultrasonic Signals to Silently Track Smartphone Users Mobil PBWCZ.CZ
29.4.17 Insecure Apps that Open Ports Leave Millions of Smartphones at Risk of Hacking Mobil PBWCZ.CZ
27.4.17Security vulnerabilities in Hyundai Blue Link mobile app allowed hackers to steal vehicles Mobil PBWCZ.CZ
20.4.17Exfiltrating data from laptop and smartphones via ambient light sensors Mobil PBWCZ.CZ
11.4.17Hackers Can Steal Your Passwords Just by Monitoring SmartPhone Sensors Mobil PBWCZ.CZ
5.4.17Millions Of Smartphones Using Broadcom Wi-Fi Chip Can Be Hacked Over-the-Air Mobil PBWCZ.CZ
31.3.17Samsung Galaxy S8 facial recognition system to unlock the device can be bypassed with a photo Mobil PBWCZ.CZ
13.3.17Flaws in MAC address randomization implemented by vendors allow mobile tracking Mobil PBWCZ.CZ
11.3.17 Ennetcom – Dutch Police confirmed to have decrypted BlackBerry PGP messages in a criminal case Mobil PBWCZ.CZ
10.3.17MAC Randomization Flaws Expose Phones to Tracking Mobil PBWCZ.CZ
3.3.17Backdoor Found in DBLTek GSM Gateways Mobil PBWCZ.CZ
2.3.17Mobile malware evolution 16 Mobil PBWCZ.CZ
28.2.17Prisons and Courts Bill allows mobile networks to deploy IMSI catchers outside of prisons Mobil PBWCZ.CZ
18.2.17Mobile apps and stealing a connected car Mobil PBWCZ.CZ
14.2.17Senators want more info on Trump’s personal phone and its defense Mobil PBWCZ.CZ
14.2.17 Senators Launch Query on Trump's Smartphone Security Mobil PBWCZ.CZ
10.2.17Every website that uses jQuery Mobile, and has any open redirect is vulnerable to XSS Mobil PBWCZ.CZ
4.2.17Hacker leaked tools stolen from mobile forensics company Cellebrite Mobil PBWCZ.CZ
13.1.17Phone-Hacking Firm Cellebrite Got Hacked; 900GB Of Data Stolen Mobil PBWCZ.CZ
13.1.17Israeli mobile phone data extraction company Cellebrite was hacked Mobil PBWCZ.CZ
27.11.16The Most Secure Smartphones – Holiday Edition Mobil PBWCZ.CZ
8.11.16 Technical analysis of the Locker virus on mobile phones Mobil PBWCZ.CZ
8.11.16 Abusing protocols in LTE networks to knock mobile devices off networks Mobil PBWCZ.CZ
7.11.16Disassembling a Mobile Trojan Attack Mobil PBWCZ.CZ
4.11.16 Wi-Fi can be turned into IMSI Catcher to Track Cell Phone Users Everywhere Mobil PBWCZ.CZ
26.10.16Hacking Firmware from Mobile Phone Hacking Company Leaked Online Mobil PBWCZ.CZ
25.10.16Hacking GSM A5 crypto algorithm by using commodity hardware Mobil PBWCZ.CZ
24.10.16InTheCyber discovered a serious flaw in messaging systems Mobil PBWCZ.CZ
17.10.16UK Police purchased IMSI-catcher technology for mobile surveillance Mobil PBWCZ.CZ
8.10.16 WiFox mobile app shows names and passwords for Wi-Fi airports networks worldwide Mobil PBWCZ.CZ
19.5.16Japanese Docomo makes its smartphone covertly trackable Mobil PBWCZ.CZ
10.5.16FCC takes initiative to Speed Up Mobile Security Updates Mobil PBWCZ.CZ
21.4.16Encrypted Smartphone Network Seized by Dutch Police for Criminal Investigation Mobil PBWCZ.CZ
15.4.16Canadian Police obtained Master Key to Crack BlackBerry Messenger Encryption Mobil PBWCZ.CZ
15.4.16 Report: Nothing useful found on San Bernardino Shooter's iPhone Mobil PBWCZ.CZ
13.4.16Hacking Samsung Galaxy via Modem interface exposed via USB Mobil PBWCZ.CZ
8.4.16Google may adopt Apple's Swift Programming Language for Android Mobil PBWCZ.CZ
30.3.16Following revelations on Paris attacks, US lawmakers target burner phones Mobil PBWCZ.CZ
26.3.16 New Bill targets Anonymous Prepaid 'Burner' phones by requiring Registration Mobil PBWCZ.CZ
11.3.16Google Android N Preview — 6 Cool Features That You Should Know Mobil PBWCZ.CZ
11.3.16Triada Trojan the most sophisticated mobile malware seen to date Mobil PBWCZ.CZ
11.3.16How to hack mobile phones embedded fingerprint sensor using 2D Printed fingerprints Mobil PBWCZ.CZ
6.3.16 SIM swap fraud cases force bank to improve security Mobil PBWCZ.CZ
5.3.16New exploit steals secret cryptographic keys from mobile devices Mobil PBWCZ.CZ
3.3.16Attack on Zygote: a new twist in the evolution of mobile threats Mobil PBWCZ.CZ
23.2.16Mobile malware evolution 15 Mobil PBWCZ.CZ
12.2.16New York Police Used Cell Phone Spying Tool Over 1000 Times Without Warrant Mobil PBWCZ.CZ