Mobile Attacks

Mobile Hacking Firm Cellebrite’s New Premium Tool can Hack & Extract Data From All iOS and High-end Android Devices

Israeli forensics firm and well-known Law enforcement contractor Cellebrite released a public statement that they can hack any iOS and…

5 years ago

OnePlus 7 Pro Fingerprint Scanner Hacked In a Minutes Using a Fake Fingerprint

OnePlus 7 Pro Fingerprint Scanner hacked within minutes using Fake Fingerprint that can be created using hot-glue due to inadequate…

5 years ago

An In-Depth Look of IMSI Catcher – A Device for Law Enforcement Agencies to Track Cell Phones

IMSI catcher is a surveillance tool  that masquerades as legitimate cell-phone towers, tricking phones within a certain radius into connecting…

5 years ago

Unpatched Address Bar Spoofing Flaw in UC Browser Exposes 600M Users to Phishing Attacks

An URL bar address spoofing vulnerability with the latest versions of UC Browser and UC Browser Mini exposes millions of…

5 years ago

Nokia 9 PureView Fingerprint Sensor Is Fooled by Chewing Gum

The brand new Nokia flagship with five camera modules looks pretty promising but has several significant weaknesses. Recently, it shocked…

5 years ago

Hack the Car in Real Time – Car Alarm Flaw let Hackers Remotely Hijack 3 Million Vehicles Globally

Researchers discovered a serious Vulnerability in famous vendors car alarm system that allows attackers to hijack the car remotely and…

6 years ago

SHAREit App Vulnerabilities Allows Hackers to Bypass Android Device Authentication & Download Arbitrary Files Remotely

Researchers recently discovered 2 new critical vulnerabilities in the SHAREit App lets attackers bypass the Android device authentication mechanism and…

6 years ago

How to Keep Your Mobile Safe from Cyber Threats

Before smartphones were popular, people didn't take mobile security much seriously. After all, we used to have a few contacts,…

6 years ago

Hackers Launching Powerful Malware ExileRAT Via Weaponized Microsoft PowerPoint Document

Researchers observed a new malicious campaign that delivers a powerful ExileRAT malware via Microsoft powerpoint documents using previously used C2…

6 years ago