Mobile Security

Vulnerability in Apple iCloud puts billion users at risk

Vulnerability in Apple iCloud puts billion users at risk

Security of over a billion iPhone owners and users of popular instant messengers is at risk due to a vulnerability…

Unofficial fixes released for 0-day issue in Windows Mobile Device Management Service

Unofficial fixes released for 0-day issue in Windows Mobile Device Management Service Access to Work or School. The problem is…

Ukrainian law enforcement officers arrested members of the hacker group Phoenix

The Security Service of Ukraine (SBU) announced the arrest of five members of the international hacker group Phoenix, which specializes…

NUCLEUS: 13 Problems Threat to Medical Devices, Automobiles and Industrial Systems

Forescout and Medigate Labs issued a report on NUCLEUS:13 problems – A Set of 13 vulnerabilities which affect Siemens Software…

Expert hacked 70% of Wi-Fi networks in Tel Aviv for research

CyberArk specialist Ido Hoorvitch hacked 70% of Wi-Fi networks in his native Tel Aviv, seeking to prove that home networks…

Microsoft warns of dangerous vulnerability in Surface Pro 3 devices

Microsoft warns of dangerous vulnerability in Surface Pro 3 devices

Microsoft engineers have published a security bulletin on a new vulnerability affecting Surface Pro 3 tablets. The bug could be used by an attacker to inject malicious devices into corporate…

Ukrainian cyber police arrested ransomware operators who “earned” $150 million

Ukrainian cyber police arrested ransomware operators who “earned” $150 million

Ukrainian Cyber Police have arrested two operators of an unnamed ransomware. It is reported that the operation was carried out jointly by the Ukrainian and French police, the FBI, Europol…

Experts showed fraudulent payments from a locked iPhone with Apple Pay and a Visa card

Experts showed fraudulent payments from a locked iPhone with Apple Pay and a Visa card

Scientists talked about how to make fraudulent payments using Apple Pay with a Visa card on a locked iPhone. This scam works over the air, even if the iPhone is…

Encryption algorithms for 2G networks have been intentionally weakened

Encryption algorithms for 2G networks have been intentionally weakened

A group of scientists from several European universities published a report on encryption algorithms for 2G networks, which many information security experts and the media have already called sensational. The…

Google stopped trying to shorten URLs in the address bar

Google stopped trying to shorten URLs in the address bar

Google’s experiment with attempt to shorten URLs (hiding parts of the URL from the address bar) has finally failed and was finished. Let me remind you that in recent years,…

Quantum computers will be able to hack bitcoin wallets

Quantum computers will be able to hack bitcoin wallets

Experts argue that quantum computers will be able to hack bitcoin wallets, but the most advanced cryptographers are in a hurry to find protection. While quantum computing is still in…

Six 0-day vulnerabilities fixed in Windows, including a commercial exploit issue

Six 0-day vulnerabilities fixed in Windows, including a commercial exploit issue

As part of June Patch Tuesday, 50 vulnerabilities in Microsoft products were fixed, including six 0-day vulnerabilities in Windows. Vulnerabilities that have been patched were found in Microsoft Office, .NET…

NASA has faced 6000 cyberattacks in the past four years

NASA has faced 6000 cyberattacks in the past four years

NASA has identified more than 6000 different cyberattacks over the past four years, according to a recent report from the National Aeronautics and Space Administration. The document states that NASA…

Qualcomm Mobile Station Modem vulnerability threatens 40% of smartphones

Qualcomm Mobile Station Modem vulnerability threatens 40% of smartphones

More than a third of all smartphones in the world have been affected by a new vulnerability in Qualcomm Mobile Station Modem (MSM). This bug gives attackers access to call…