Hacking Samsung Galaxy via Modem interface exposed via USB
Modems in a number of Samsung Galaxy devices are open to receiving AT commands over the USB cable even when they are locked. Do you know that modems in aRead More →
Modems in a number of Samsung Galaxy devices are open to receiving AT commands over the USB cable even when they are locked. Do you know that modems in aRead More →
Lottery boss wins $16.5 million in six years by tampering random number generator. According to The Des Moines Register, in a case from last year, new details have been disclosed thatRead More →
A group of security researchers has found a security flaw in the Apple iMessage that exposed chat history and sensitive data with a single click. Recently WhatsApp has introduced the end-to-endRead More →
Sasha Levin kicks off ‘security tree’ side project. Linux developer Sasha Levin has kicked off a project in which he proposes gathering up kernel security fixes under a single tree. TheRead More →
Short Bytes: Two Google developers, Reilly Grant and Ken Rockot, have uploaded a draft document to the World Wide Web Consortium’s Web Incubator Community Group (W3C WICG), describing a new wayRead More →
I had almost forgotten about my experience with Worldpay’s Merchant Portal from just over a year ago, but my recent post regarding another payment processor helped to refresh my memory. IRead More →
Ramdo is a family of malware that performs fraudulent website ‘clicks.’ Ramdo malware activity first surfaced in late 2013 and has since continued to infect machines worldwide, primarily through theRead More →
Attacks against home routers have been going around for years—from malware that rigs routers to DNS rebinding attacks and backdoors, among others. Just last year one of our researchers reportedRead More →
Rokku is yet another ransomware, discovered in recent weeks. Currently, it’s most common distribution method is spam where a malicious executable is dropped by a VB script belonging to the e-mail’sRead More →
US judge orders Apple to help FBI with iPhone unlocking in two more cases. And so the deluge begins! This is exactly what Apple was talking about when it opposed hackingRead More →