Hackers spread malicious applications using the fear of COVID-19
The drastic spread of coronavirus across the world has not stopped cybercriminals from exploiting fear to hack into devices.
Researchers discovered a new Coronavirus...
Cloud-Based Espionage: A Deep Dive into SloppyLemming’s Targeted Attacks on South...
SloppyLemming, a sophisticated threat actor group, has emerged as a key player in the landscape of cyber espionage, leveraging multiple cloud service providers to...
Conversations live between deaf and hearing people : App takes speech...
Customer: "Hello." Barista: "Hello. What can I get you?" Customer: "I would like tea." For many, this is the most mundane, forgettable exchange between...
New Android Malware Secretly Records Phone Calls and Steals Private Data
Security researchers at Cisco Talos have uncovered variants of a new Android Trojan that are being distributed in the wild disguising as a fake...
Samsung Galaxy: Falla Sicurezza Consente la Registrazione delle Telefonate
Una falla ultime versioni di Samsung Galaxy, (IMSI-catcher), può essere utilizzata per le chiamate e la registrazione delle telefonate - dimostrato da due ricercatori...
All OnePlus Devices Vulnerable to Remote Attacks Due to 4 Unpatched...
There is a bad news for all OnePlus lovers.
A security researcher has discovered four vulnerabilities that affect all OnePlus handsets, including One, X, 2,...
An attacker could activate Siri on your cellphone by ultrasonic waves
Recent studies show that it is possible to exploit the non-linearity in microphone to deliver inaudible commands to the system via ultrasound signals.
Ultrasonic...
A Simple JavaScript Exploit Bypasses ASLR Protection On 22 CPU Architectures
Security researchers have discovered a chip flaw that could nullify hacking protections for millions of devices regardless of their operating system or application running...
AnubisSpy Malware: Stealing photos, videos & spying on Android users
Android devices seem to be the most preferred target for hackers as there have so far been multiple incidents involving malware, ransomware and cryptocurrency miner apps designed...
Spectre: Two new vulnerabilities affecting computers globally
In 2018, industry and academic researchers revealed a potentially devastating hardware flaw that made computers and other devices worldwide vulnerable to attack.
Researchers named the...
Millions of Android Devices Using Broadcom Wi-Fi Chip Can Be Hacked...
Google has released its latest monthly security update for Android devices, including a serious bug in some Broadcom Wi-Fi chipsets that affects millions of Android devices,...
The Proliferation of Spyware: A Deep Dive into Global Markets, Threats...
For over three decades, a range of digital tools with mythical, evocative names have been deployed in silence across the globe, quietly infiltrating devices...
Nissan Leaf ; Hackerata a causa di API vulnerabili
Nissan Leaf ; Hackerataa causa di API vulnerabili
I ricercatori di sicurezza mostrano come un hacker è in grado di accedere all'automobile elettrica Nissan Leaf...
Android Super Mario Run is Actually Malware – Don’t Download It
Super Mario game is loved by all, elders, adults and young ones alike.
The game has been released on iOS but not on Android OS,...
New Android Malware Infected 2 Million Google Play Store Users
Initially thought to be 600,000 users, the number of Android users who have mistakenly downloaded and installed malware on their devices straight from Google...