Mobile Attacks

SIM Swap Attack Let Hackers Port a Telephone Number to a New SIM to Hack WhatsApp & Bypass 2FASIM Swap Attack Let Hackers Port a Telephone Number to a New SIM to Hack WhatsApp & Bypass 2FA

SIM Swap Attack Let Hackers Port a Telephone Number to a New SIM to Hack WhatsApp & Bypass 2FA

Cybercriminals are actively performing SIM swap Attacks in various countries to bypass 2 Factor Authentication and to compromise the various…

2 years ago
BrutePrint – Bruteforce Attack to Bypass User Authentication on SmartphonesBrutePrint – Bruteforce Attack to Bypass User Authentication on Smartphones

BrutePrint – Bruteforce Attack to Bypass User Authentication on Smartphones

A novel assault named 'BrutePrint' has been unveiled by the joint efforts of Tencent Labs and Zhejiang University researchers, enabling…

2 years ago
Cybersecurity and Your Phone TodayCybersecurity and Your Phone Today

Cybersecurity and Your Phone Today

Recently, Samsung has rolled out security updates for its mobile devices to fix some critical security vulnerabilities. Samsung has published…

5 years ago
Complete Guide & Best Practices for Enterprise Mobile Device Security to Protect From Malware AttacksComplete Guide & Best Practices for Enterprise Mobile Device Security to Protect From Malware Attacks

Complete Guide & Best Practices for Enterprise Mobile Device Security to Protect From Malware Attacks

Nowadays, employees, customers, and stakeholders at all levels are adopting BYOD onboarding practices. Fortunately, it's entirely possible for companies to…

5 years ago
RCS – New Android Text Messaging Service Let Hackers to Take Full Control of User AccountsRCS – New Android Text Messaging Service Let Hackers to Take Full Control of User Accounts

RCS – New Android Text Messaging Service Let Hackers to Take Full Control of User Accounts

RCS expanded as Rich Communications Services is the next generation SMS protocol aimed to replace the SMS and MMS services.…

5 years ago
Most Important Steps to Keep Your Mobile Safe From Sophisticated Cyber ThreatsMost Important Steps to Keep Your Mobile Safe From Sophisticated Cyber Threats

Most Important Steps to Keep Your Mobile Safe From Sophisticated Cyber Threats

Mobile phones have become a part of everyday life, and their functionality continues to develop at a rapid pace. You…

6 years ago
New Android Malware “BasBanke” Steal Financial Data Such as Credentials & Credit/Debit Card NumbersNew Android Malware “BasBanke” Steal Financial Data Such as Credentials & Credit/Debit Card Numbers

New Android Malware “BasBanke” Steal Financial Data Such as Credentials & Credit/Debit Card Numbers

Researchers discovered a new Android Malware called "BasBanke" targeting Brazilian users to steals financial related sensitive data such as credentials…

6 years ago
How to Keep Your Mobile Safe from Cyber ThreatsHow to Keep Your Mobile Safe from Cyber Threats

How to Keep Your Mobile Safe from Cyber Threats

Before smartphones were popular, people didn't take mobile security much seriously. After all, we used to have a few contacts,…

6 years ago
GPlayed – New Malware Posed as Google Play App to Spy & Steal Data From Your Entire Android PhoneGPlayed – New Malware Posed as Google Play App to Spy & Steal Data From Your Entire Android Phone

GPlayed – New Malware Posed as Google Play App to Spy & Steal Data From Your Entire Android Phone

Newly discovered android based GPlayed Malware posed as Google Play app with sophisticated futures to spy android phone and steal…

6 years ago
Warning Signs of Your Smartphone Getting HackedWarning Signs of Your Smartphone Getting Hacked

Warning Signs of Your Smartphone Getting Hacked

It’s one of the worst feelings in the world having your computer hacked, hit with a virus and losing all…

7 years ago