Mobile Security

Quantum computers will hack

Quantum computers will be able to hack bitcoin wallets

Experts argue that quantum computers will be able to hack bitcoin wallets, but the most advanced cryptographers are in a…

Six 0-day vulnerabilities fixed in Windows, including a commercial exploit issue

As part of June Patch Tuesday, 50 vulnerabilities in Microsoft products were fixed, including six 0-day vulnerabilities in Windows. Vulnerabilities…

NASA has faced 6000 cyberattacks in the past four years

NASA has identified more than 6000 different cyberattacks over the past four years, according to a recent report from the…

Qualcomm Mobile Station Modem vulnerability threatens 40% of smartphones

More than a third of all smartphones in the world have been affected by a new vulnerability in Qualcomm Mobile…

Moxie Marlinspike Demonstrates Cellebrite Tools Vulnerabilities

Signal creator, renowned cryptographer, hacker, researcher and anarchist Moxie Marlinspike studied the products of the famous Israeli cybercriminalistic company Cellebrite…

Vulnerabilities in Old GTP

Vulnerabilities in old GTP protocol could affect 4G and 5G networks

Experts cautioned that vulnerabilities in the old GTP (GPRS Tunneling Protocol) could quite seriously affect the operation of 4G and 5G networks. In reports published last week and in December…

COVID-19 Contact Tracking Apps

Fake COVID-19 contact tracking apps install banking trojans

Researchers from California-based IS company Anomali have discovered 12 fake COVID-19 patient contact tracking apps posing as official programs. Attackers are actively exploiting the panic around the coronavirus pandemic to…

Qatar spyware containing COVID-19

Qatar obliged citizens to install “spyware” for containing COVID-19 pandemic

As part of the fight against the spread of coronavirus infection, the Qatar government has obliged citizens and residents to install special software on their mobile devices to contain the…

Hackers Attacked Ghost Platform

Hackers Attacked Ghost Blogging Platform and LineageOS Servers Using Salt Vulnerabilities

According to the development team of the Ghost blogging platform, hackers attacked it using the Authentication bypass vulnerabilities (CVE-2020-11651) and directory bypass (CVE-2020-11652) vulnerabilities in Salt in order to gain…

Discovered new exploit for iOS

For iOS was discovered a new exploit, with the help of which China traced the Uyghurs

Specialists of the information security company Volexity discovered a new exploit for iOS called Insomnia. According to the researchers, the malware associated with the efforts of the Chinese authorities to…

NASA staff hacker attacks

NASA staff faces exponential increase in number of hacker attacks

Representatives of the space agency said that recently NASA staff and home-based agency contractors suffered from increase in the number of hacker attacks, and their devices are constantly trying to…

Increased number of "coronavirus" cyberattacks

The number of “coronavirus” cyberattacks increased to 5,000 per day

Check Point experts estimated that the number of “coronavirus” cyberattacks increased to 5,000 per day, and number of attacks on sites posing as Netflix services doubled. Researchers say the total…

Malware steal Android cookies

Two new malware can steal cookies from Android apps

IS experts discovered two new malware for Android (recognized as the most vulnerable OS over the past year), called Cookiethief and Youzicheng. They are can steal cookies stored in browsers…

Android users are at risk

More than 40% of Android users are at risk of cyberattacks

According to a study by Which company, more than 40% of active Android users around the world use OS version 6.0 or earlier. Therefore, they will not receive security updates…

Malicious extension Ledger Live

Malicious Ledger Live extension for Chrome steals Ledger wallet data

Harry Denley, Director of Security in MyCrypto discovered the malicious Ledger Live extension for Chrome, which is actively advertised on Google and stealing Ledger wallet data. It masks itself as…

IMP4GT Vulnerability Threats Smartphones

IMP4GT Vulnerability in LTE Threatens Almost All Modern Smartphones

Experts from Ruhr University reported an IMP4GT (IMPersonation Attacks in 4G NeTworks) problem. Modern LTE-enabled devices are vulnerable to IMP4GT, therefore, it threatens almost all smartphones, tablets, and IoT devices.…

Samsung amends Android kernel

Samsung amends Android kernel that impair security

Jann Horn, Google Project Zero Specialist, studied the Android kernel, supplied by Samsung with its Galaxy A50 phones, and stated that the security mechanisms added by Samsung engineers to the…