Mobile Security

Qualcomm Mobile Station Modem vulnerability threatens 40% of smartphones

Qualcomm Mobile Station Modem vulnerability threatens 40% of smartphones

More than a third of all smartphones in the world have been affected by a new vulnerability in Qualcomm Mobile…

Moxie Marlinspike Demonstrates Cellebrite Tools Vulnerabilities

Signal creator, renowned cryptographer, hacker, researcher and anarchist Moxie Marlinspike studied the products of the famous Israeli cybercriminalistic company Cellebrite…

Tencent and Chinese police conducted a joint operation against game cheat developers

Chinese police in collaboration with tech giant Tencent have launched a joint operation against cheat developers. 10 developers of 17…

Experts have discovered bugs in the 5G protocol that allow tracking location and arranging of DoS attacks

AdaptiveMobile specialists have published a report on new bugs in the 5G protocol, thanks to which it is possible to…

Expert intercepted windows.com traffic using bitsquatting

An independent expert known as Remy discovered that Microsoft domains were not protected against bitsquatting and intercepted windows.com traffic. The…

Cybercriminals started using Google services more often in phishing campaigns

Cybercriminals started using Google services more often in phishing campaigns

Security researchers have reported an increase in cyberattacks using Google services in phishing campaigns, as a tool to bypass security and steal credentials, credit cards, and other personal information. The…

Microsoft urges users to opt out of multi-factor authentication via phone

Microsoft urges users to opt out of multi-factor authentication via phone

Microsoft experts have once again raised the issue of the insecurity of multi-factor authentication through the phone, that is, through one-time codes in SMS messages or voice calls. Instead, the…

Platypus attack allows stealing data from Intel processors

Platypus attack allows stealing data from Intel processors

A group of scientists from the Technical University of Graz (Austria), the University of Birmingham, and the Helmholtz Center for Information Security in Germany (CISPA) have revealed details of a…

Experts discovered that many mobile browsers are vulnerable to url spoofing

Experts discovered that many mobile browsers are vulnerable to url spoofing

Rapid7 analysts and independent information security expert Rafay Baloch discovered that seven popular mobile browsers are vulnerable to url spoofing. They allow malicious sites to change the URL and display…

MalLocker ransomware easily tricks Russians, pretending to be a screen lock from the police

MalLocker ransomware easily tricks Russians, pretending to be a screen lock from the police

Microsoft experts talked about the new Android ransomware AndroidOS/MalLocker. (hereinafter simply MalLocker), which easily tricks Russians by pretending to be a screen lock from the police. Android ransomware abuses the…

Cellmate men’s chastity belts are vulnerable to attacks and dangerous for users

Cellmate men’s chastity belts are vulnerable to attacks and dangerous for users

Pen Test Partners analysts have studied an extremely unusual device: the Cellmate male chastity belts, manufactured by the Chinese company Qiui. So Cellmate chastity belts turned out to be quite…

Google recruits a team of experts to find bugs in Android applications

Google recruits a team of experts to find bugs in Android applications

ZDNet reports that a number of new positions have been added to Google’s job list. The fact is that Google appears to be recruiting a team of Android security experts…

Attackers can bypass TikTok multi-factor authentication through the site

Attackers can bypass TikTok multi-factor authentication through the site

Journalists of the ZDNet publication, citing one of their readers, report that the web version of TikTok did not receive multi-factor authentication (via mail and SMS), which developers established for…

Microsoft left open one of the internal servers of the search engine Bing

Microsoft left open one of the internal servers of the search engine Bing

Ata Hakcil, cyber security specialist at WizCase, discovered that Microsoft employees mistakenly left one of the Bing backend servers open – it was available to anyone. The researcher writes that…