Mobile Security

Microsoft warns of dangerous vulnerability in Surface Pro 3 devices

Microsoft warns of dangerous vulnerability in Surface Pro 3 devices

Microsoft engineers have published a security bulletin on a new vulnerability affecting Surface Pro 3 tablets. The bug could be…

Ukrainian cyber police arrested ransomware operators who “earned” $150 million

Ukrainian Cyber Police have arrested two operators of an unnamed ransomware. It is reported that the operation was carried out…

Experts showed fraudulent payments from a locked iPhone with Apple Pay and a Visa card

Scientists talked about how to make fraudulent payments using Apple Pay with a Visa card on a locked iPhone. This…

Encryption algorithms for 2G networks have been intentionally weakened

A group of scientists from several European universities published a report on encryption algorithms for 2G networks, which many information…

Google stopped trying to shorten URLs in the address bar

Google’s experiment with attempt to shorten URLs (hiding parts of the URL from the address bar) has finally failed and…

Moxie Marlinspike Demonstrates Cellebrite Tools Vulnerabilities

Moxie Marlinspike Demonstrates Cellebrite Tools Vulnerabilities

Signal creator, renowned cryptographer, hacker, researcher and anarchist Moxie Marlinspike studied the products of the famous Israeli cybercriminalistic company Cellebrite and identified a number of vulnerabilities in their work. In…

Tencent and Chinese police conducted a joint operation against game cheat developers

Tencent and Chinese police conducted a joint operation against game cheat developers

Chinese police in collaboration with tech giant Tencent have launched a joint operation against cheat developers. 10 developers of 17 different cheating tools in games (including Overwatch and Call of…

Experts have discovered bugs in the 5G protocol that allow tracking location and arranging of DoS attacks

Experts have discovered bugs in the 5G protocol that allow tracking location and arranging of DoS attacks

AdaptiveMobile specialists have published a report on new bugs in the 5G protocol, thanks to which it is possible to disable network segments (DoS) and steal user data, including location…

Expert intercepted windows.com traffic using bitsquatting

Expert intercepted windows.com traffic using bitsquatting

An independent expert known as Remy discovered that Microsoft domains were not protected against bitsquatting and intercepted windows.com traffic. The expert conducted his experiments on the example of the windows.com…

Netherlands police posted warnings on hacker forums

Netherlands police posted warnings on hacker forums

The Netherlands police posted warnings on popular Russian and English hacker forums (RaidForums and XSS), stating that “the deployment of criminal infrastructure in the Netherlands is hopeless.” The messages were…

In 2020, Google paid cybersecurity experts $6.7 million

In 2020, Google paid cybersecurity experts $6.7 million

During the year, Google paid out 6.7 million to cybersecurity experts and published statistics on bug bounty programs for 2020. It turned out that during this time, researchers from 62…

Authorities of South Africa create their own browser to continue to use Flash

Authorities of South Africa create their own browser to continue to use Flash

ZDNet reports that the South Africa Revenue service has created its own browser to continue using the Adobe Flash Player on the existing site, taking some web forms from Flash…

New worm for Android spreads rapidly via WhatsApp

New worm for Android spreads rapidly via WhatsApp

ESET security researcher Lukas Stefanko reported a new malware: he said that a new worm for Android automatically spreads through WhatsApp messages. The main purpose of malware is to trick…

Hackers majorly use Microsoft and DHL brands in phishing attacks

Hackers majorly use Microsoft and DHL brands in phishing attacks

Hackers majorly use the Microsoft and DHL brands in phishing attacks. In Q4 2020, cybercriminals used more brands from the tech industry, followed by shipping and retail businesses. Information security…