Mobile Attacks

Hackers Earning Money from Invisible Ads using Android Trojan that Downloads 6.5 Million Times via Google Play

A powerful Android Trojan distributed through Google Play store apps that posed as Fashion and game apps to generate a huge…

6 years ago

Serious iOS Bug – A Single Text Character Can Crash any Apple iPhone, Mac or iPad

A single character can crash iPhone if it simply pasted in the text field, received as a message via apps…

7 years ago

New “GnatSpy” Mobile Malware Stealing data Such as Images, Text messages, Contacts, and Call History

A newly emerging mobile malware GnatSpy capable of abusing infected mobile and stealing various type of data such Images, Text…

7 years ago

New Android Banking Trojan “RED ALERT 2.0” Targeting 60 Banks and Social Apps

A new Banking Trojan called "RED ALERT 2.0" Targeting  Around 60 Banks and Social Media Android Apps by using overlay…

7 years ago

A Mobile Ransomware Called “LeakerLocker” Found in Google Play Store Which Leaks Phone’s Sensitive Information and Demand to Pay

Mobile Ransomware called LeakerLocker Found in Google Playstore which infect the Android Mobile user and steals the information such as…

7 years ago

Millions of Android Phones including latest Versions Vulnerable to Cloak & Dagger attack

Cloak & Dagger attack discovered by security experts from Georgia Institute of Technology, which allows attackers to get complete control…

7 years ago

Samsung Galaxy iris recognition can be Hacked simply with Owner’s Photo

Security specialists from Chaos Computer Clubs found basic strides to break iris recognition system scanner of the new Samsung Galaxy…

7 years ago

WhatsApp scam – Advertising Netflix Subscription free for a year

[jpshare]These days it winds up plainly normal as we see a huge increase with Scam message in Whatsapp, here is…

7 years ago

New Dangerous Android Permission Security Flaw leads to Ransomware and Banking Malware Attacks

[jpshare]A new Android vulnerability discovered in Android's security Mechanism which leads to several android permission based attacks during run-time including ransomware,…

7 years ago

Mobile spyware that steal Twitter credentials uses sandbox to Evade antivirus detections

[jpshare]Security Experts from Avast came through a Malware that uses a sandbox(DroidPlugin) to dynamically load and run an app, without…

8 years ago