Tag: Mobile Security
You are here: Home \ Mobile Security
Armed with the information, adversaries can explore and attack the local WiFi network, or identify and physically track any Android device.
BusyGasper is rudimentary spyware with a bevy of novel twists that is highly effective at collecting and exfiltrating data from Android phones.
Several developer tools capture a screen as an app crashes and send it to a third-party server creating a risk of corporate data leakage.
Researchers used AT commands to rewrite device firmware, bypass Android security mechanisms, exfiltrate sensitive device information, and unlock screens.
After Google publicized the flaw seven days after a patch was issued, the Epic Games CEO called out the company for irresponsible disclosure.
T-Mobile alerts millions of its customers to a breach of its website that resulted in subscriber names, zip codes, phone numbers, email addresses and account numbers being stolen.
The spyware’s surveillance capabilities are extensive, logging every call, text, photo, video and more, and sending the data to the attackers.
After a report said Google tracks users even when they opt out, the company is under fire from activists and has been slapped with a lawsuit.
Researchers launched a Proof-of-Concept attack on two Android mobile phones and an embedded system board.
Cryptocurrency angel investor Michael Terpin seeks damages for “gross negligence” by the carrier, alleging it turned a blind eye to store employees’ malicious activities.
123456789 ... 18 ... 27 ... 36 ...