Tuesday, April 22, 2025

Mobile Attacks

OnePlus 7 Pro Fingerprint Scanner Hacked In a Minutes Using a Fake Fingerprint

OnePlus 7 Pro Fingerprint Scanner hacked within minutes using Fake Fingerprint that can be created using hot-glue due to inadequate security that is implemented...

An In-Depth Look of IMSI Catcher – A Device for Law Enforcement Agencies to Track Cell Phones

IMSI catcher is a surveillance tool  that masquerades as legitimate cell-phone towers, tricking phones within a certain radius into connecting to the device...

Unpatched Address Bar Spoofing Flaw in UC Browser Exposes 600M Users to Phishing Attacks

An URL bar address spoofing vulnerability with the latest versions of UC Browser and UC Browser Mini exposes millions of users to Phishing Attacks. The...

Nokia 9 PureView Fingerprint Sensor Is Fooled by Chewing Gum

The brand new Nokia flagship with five camera modules looks pretty promising but has several significant weaknesses. Recently, it shocked the world with dangerous...

Hack the Car in Real Time – Car Alarm Flaw let Hackers Remotely Hijack 3 Million Vehicles Globally

Researchers discovered a serious Vulnerability in famous vendors car alarm system that allows attackers to hijack the car remotely and kill the engine while...

SHAREit App Vulnerabilities Allows Hackers to Bypass Android Device Authentication & Download Arbitrary Files Remotely

Researchers recently discovered 2 new critical vulnerabilities in the SHAREit App lets attackers bypass the Android device authentication mechanism and download the arbitrary files...

How to Keep Your Mobile Safe from Cyber Threats

Before smartphones were popular, people didn't take mobile security much seriously. After all, we used to have a few contacts, some classic games, and...

Hackers Launching Powerful Malware ExileRAT Via Weaponized Microsoft PowerPoint Document

Researchers observed a new malicious campaign that delivers a powerful ExileRAT malware via Microsoft powerpoint documents using previously used C2 server infrastructure. Attackers deliver the...