Category: Mobile security

Researchers Discover Android Variant of Dreaded iOS Spyware Pegasus

The infamous Pegasus malware, a strain of spyware that is known to target iOS devices now has a cousin in Chrysaor, an Android variant that can steal and compromise the world’s most widely used...

Read more arrow_forward

Ransomware Hackers Could Soon Target Smartphones, TVs: UK Cybersecurity Chiefs

A joint report by the UK’s National Cyber Security Centre (NCSC) and the National Crime Agency (NCA) has underlined the risk of hackers targeting internet-connected devices for extortion. As...

Read more arrow_forward

The FTC Reminds Shoppers of Fake Apps during Holiday Period

In an official release, the Federal Trade Commission (FTC) has warned shoppers of fraudulent mobile applications during the holiday shopping season which has proven to result in plenty of cases of...

Read more arrow_forward

Gooligan Hacks Over 1 Million Google Accounts

Google has suffered a significant malware infection that has affected over a million Android users around the world, a security firm has revealed. Researchers at Check Point Technologies have...

Read more arrow_forward

3 Million Android Devices Vulnerable Due to a Dangerous Pre-Installed Rootkit

Nearly three million Android devices are vulnerable to a man-in-the-middle (MiTM) attack, researchers have discovered, leaving these devices vulnerable to attackers who can remotely take full control...

Read more arrow_forward

Alert: iPhone Passcode Can Be Bypassed to Access User Media

Despite Touch ID’s implementation, the Apple iPhone’s passcode has proven to be vulnerable, with a proof-of-concept demonstrating that the security feature can be bypassed to access the...

Read more arrow_forward

OAuth 2.0 Claims it is Still Secure, “If Used Properly”

In the aftermath of the revelation that a billion mobile apps could be hijacked through a vulnerability in OAuth 2.0 – as discovered by three Chinese researchers from the University of Hong Kong...

Read more arrow_forward

A Billion Mobile Apps are Vulnerable to Account Hijacking

Three researchers from the University of Hong Kong have determined that third-party applications that allow for single sign-on processes via Facebook and Google by supporting the OAuth 2.0 protocol...

Read more arrow_forward

Chinese Hacking Crew Exploits iPhones and Google Nexus Devices, Awarded $200,000

Apple’s iPhone and Google’s Nexus 6P, which run iOS and Android - two most widely-used mobile phone platforms in the world have been hacked this week as a part of the Pwn2Own white hat...

Read more arrow_forward

A Banking Trojan Will Bypass Android 6 Security

 A modified piece of malware can now force its way to bypass two fundamental security features introduced in Android 6. A case of social engineering more-so than exploiting any...

Read more arrow_forward

Mobile Malware Leaves 90% Android Devices Vulnerable

A new family of malware, known as Godless, has been discovered as a serious exploit that leaves “virtually any Android device running Android 5.1 (Lollipop) or earlier,” vulnerable....

Read more arrow_forward

Mobile Security - In the Words of Experts

With all the buzz around mobile security lately, we have decided to compile a list of some of the best mobile security quotes from experts on mobile security – shedding light on the topic...

Read more arrow_forward

Is Mobile Security on Your Radar?

As the entire world moves towards mobile and the Internet of Things (IoT) surges the enterprise, mobile security has become crucial for businesses of all sizes across the industry. After all, these...

Read more arrow_forward

If you have any further questions, please don't hesitate to contact us.