At Mobile Pwn2Own, $215K Awarded for Android, iPhone Hacks
At the 2016 mobile Pwn2Own event, held on Oct. 26 in Tokyo, security researchers were able to exploit devices that vendors had fully patched. In total, Trend Micro’s Zero DayRead More →
Mobile Security Incident News | Infosec Blog | Mobile Security Tutorials
At the 2016 mobile Pwn2Own event, held on Oct. 26 in Tokyo, security researchers were able to exploit devices that vendors had fully patched. In total, Trend Micro’s Zero DayRead More →
The latest Android.Lockscreen variants declare their activity as part of the launcher category to get around Android’s security restrictions. New variants of Android.Lockscreen are using a simple, yet effective techniqueRead More →
Apple has distributed a fresh round of security updates to address remote-code execution holes in iOS, macOS, Safari, and the firmware for Apple Watch and AppleTV. Miscreants who exploit theseRead More →
New rooting technique is believed to work against every version. There’s a new method for rooting Android devices that’s believed to work reliably on every version of the mobile operating systemRead More →
Permission-less apps take only seconds to root phones from LG, Samsung and Motorola. Researchers have devised an attack that gains unfettered “root” access to a large number of Android phones, exploitingRead More →
Even if you have an iPhone 6S protected by a 6 digits password plus the touch ID fingerprint it is possible to unlock it. 1. Introduction You have an iPhoneRead More →
It’s been several weeks since the story broke about Trident/Pegasus and the vulnerabilities they exploited in iOS. There has certainly been a significant (although a lot less than expected) amount ofRead More →
Pork Explosion backdoor affects Foxconn-made devices. Some Android devices that contain firmware created by Foxconn may be vulnerable via a debugging feature left inside the OS bootloader, which acts asRead More →
In the first half of 2016 we noticed that Android banking Trojans had started to improve their phishing overlays on legitimate financial apps to ask for more information. Victims were requested toRead More →
Podesta’s iPhone reportedly wiped within hours of his Twitter account being hacked. Unconfirmed evidence builds a strong case that an Apple iCloud account belonging to Hillary Clinton’s campaign chief, JohnRead More →