lunedì, Gennaio 13, 2025

Hackers spread malicious applications using the fear of COVID-19

3
The drastic spread of coronavirus across the world has not stopped cybercriminals from exploiting fear to hack into devices. Researchers discovered a new Coronavirus...

Cloud-Based Espionage: A Deep Dive into SloppyLemming’s Targeted Attacks on South...

0
SloppyLemming, a sophisticated threat actor group, has emerged as a key player in the landscape of cyber espionage, leveraging multiple cloud service providers to...

Conversations live between deaf and hearing people : App takes speech...

0
Customer: "Hello." Barista: "Hello. What can I get you?" Customer: "I would like tea." For many, this is the most mundane, forgettable exchange between...

New Android Malware Secretly Records Phone Calls and Steals Private Data

0
Security researchers at Cisco Talos have uncovered variants of a new Android Trojan that are being distributed in the wild disguising as a fake...

Samsung Galaxy: Falla Sicurezza Consente la Registrazione delle Telefonate

0
Una falla  ultime versioni di Samsung Galaxy, (IMSI-catcher), può essere utilizzata per le chiamate e la registrazione delle telefonate - dimostrato da due ricercatori...

All OnePlus Devices Vulnerable to Remote Attacks Due to 4 Unpatched...

0
There is a bad news for all OnePlus lovers. A security researcher has discovered four vulnerabilities that affect all OnePlus handsets, including One, X, 2,...

An attacker could activate Siri on your cellphone by ultrasonic waves

0
Recent studies show that it is possible to exploit the non-linearity in microphone to deliver inaudible commands to the system via ultrasound signals. Ultrasonic...

A Simple JavaScript Exploit Bypasses ASLR Protection On 22 CPU Architectures

0
Security researchers have discovered a chip flaw that could nullify hacking protections for millions of devices regardless of their operating system or application running...

AnubisSpy Malware: Stealing photos, videos & spying on Android users

0
Android devices seem to be the most preferred target for hackers as there have so far been multiple incidents involving malware, ransomware and cryptocurrency miner apps designed...

Spectre: Two new vulnerabilities affecting computers globally

0
In 2018, industry and academic researchers revealed a potentially devastating hardware flaw that made computers and other devices worldwide vulnerable to attack. Researchers named the...

Millions of Android Devices Using Broadcom Wi-Fi Chip Can Be Hacked...

0
Google has released its latest monthly security update for Android devices, including a serious bug in some Broadcom Wi-Fi chipsets that affects millions of Android devices,...

The Proliferation of Spyware: A Deep Dive into Global Markets, Threats...

0
For over three decades, a range of digital tools with mythical, evocative names have been deployed in silence across the globe, quietly infiltrating devices...

Nissan Leaf ; Hackerata a causa di API vulnerabili

0
Nissan Leaf ; Hackerataa causa di API vulnerabili I ricercatori di sicurezza mostrano come un hacker è in grado di accedere all'automobile elettrica Nissan Leaf...

Android Super Mario Run is Actually Malware – Don’t Download It

0
Super Mario game is loved by all, elders, adults and young ones alike. The game has been released on iOS but not on Android OS,...

New Android Malware Infected 2 Million Google Play Store Users

0
Initially thought to be 600,000 users, the number of Android users who have mistakenly downloaded and installed malware on their devices straight from Google...