Nowadays, employees, customers, and stakeholders at all levels are adopting BYOD onboarding practices. Fortunately, it’s entirely possible for companies to restrict network access until clients have been approved. If a…
Browsing CategoryMobile Attacks
StrandHogg – Hackers Aggressively Exploiting New Unpatched Android OS Vulnerability in Wide Using Malware
Newly discovered Android vulnerability dubbed “StrandHogg” being exploited in wide by unknown hackers using weaponized malware apps that posed as a legitimate one to perform various malicious activities. The vulnerability…
RCS – New Android Text Messaging Service Let Hackers to Take Full Control of User Accounts
RCS expanded as Rich Communications Services is the next generation SMS protocol aimed to replace the SMS and MMS services. It was taken over by GSM Association in the year…
9 Android Zero-day Vulnerabilities Affects Billions of Android Devices – Hackers Perform DOS, RCE, Make, Deny & Spoof Calls
Exclusive research found the 9 critical System-level Android VoIP Zero-day vulnerabilities that allow attackers to perform malicious operations, including denying voice calls, caller ID spoofing, unauthorized call operations, DOS attack,…
Most Important Steps to Keep Your Mobile Safe From Sophisticated Cyber Threats
Mobile phones have become a part of everyday life, and their functionality continues to develop at a rapid pace. You can switch from monitoring work emails to playing the latest…
Mobile Hacking Firm Cellebrite’s New Premium Tool can Hack & Extract Data From All iOS and High-end Android Devices
Israeli forensics firm and well-known Law enforcement contractor Cellebrite released a public statement that they can hack any iOS and High-end Android devices for law enforcement agencies. Cellebrite Mobile Synchronization…
OnePlus 7 Pro Fingerprint Scanner Hacked In a Minutes Using a Fake Fingerprint
OnePlus 7 Pro Fingerprint Scanner hacked within a minutes using Fake Fingerprint that creates using hot-glue due to poor security that implemented in the OnePlus 7 Pro Fingerprinting unlock Feature.…
Unpatched Address Bar Spoofing Flaw in UC Browser Exposes 600M Users to Phishing Attacks
An URL bar address spoofing vulnerability with the latest versions of UC Browser and UC Browser Mini exposes millions of users to Phishing Attacks. The vulnerability was discovered by the…
SIM Swap Attack Let Hackers Port a Telephone Number to a New SIM to Hack WhatsApp & Bypass 2FA
Cybercriminals are activity performing SIM swap Attack in various countries to bypass 2 Factor Authentication and to compromise the various social media apps including WhatsApp by porting a victims telephone…
New Android Malware “BasBanke” Steal Financial Data Such as Credentials & Credit/Debit Card Numbers
Researchers discovered a new Android Malware called “BasBanke” targeting Brazilian users to steals financial related sensitive data such as credentials and credit/debit card numbers. BasBanke Malware continuously infects users since…