Israeli forensics firm and well-known Law enforcement contractor Cellebrite released a public statement that they can hack any iOS and…
OnePlus 7 Pro Fingerprint Scanner hacked within minutes using Fake Fingerprint that can be created using hot-glue due to inadequate…
IMSI catcher is a surveillance tool that masquerades as legitimate cell-phone towers, tricking phones within a certain radius into connecting…
An URL bar address spoofing vulnerability with the latest versions of UC Browser and UC Browser Mini exposes millions of…
The brand new Nokia flagship with five camera modules looks pretty promising but has several significant weaknesses. Recently, it shocked…
Researchers discovered a serious Vulnerability in famous vendors car alarm system that allows attackers to hijack the car remotely and…
Researchers recently discovered 2 new critical vulnerabilities in the SHAREit App lets attackers bypass the Android device authentication mechanism and…
Before smartphones were popular, people didn't take mobile security much seriously. After all, we used to have a few contacts,…
Researchers observed a new malicious campaign that delivers a powerful ExileRAT malware via Microsoft powerpoint documents using previously used C2…
Recently we have seen more increase in various threats and the ways of intruding the network and there were increase…