Mobile Security

Antidot Malware Attacking Employees Android Devices To Inject Malicious PayloadsAntidot Malware Attacking Employees Android Devices To Inject Malicious Payloads

Antidot Malware Attacking Employees Android Devices To Inject Malicious Payloads

Researchers discovered a new variant of the AntiDot banking trojan targeting Android mobile devices through a mobile-phishing (mishing) campaign, where…

4 months ago
New WhatsApp 0-Day Bug Let Hackers Execute a Code & Take Full App Control RemotelyNew WhatsApp 0-Day Bug Let Hackers Execute a Code & Take Full App Control Remotely

New WhatsApp 0-Day Bug Let Hackers Execute a Code & Take Full App Control Remotely

WhatsApp Bug. WhatsApp silently fixed two critical zero-day vulnerabilities that affect both Android & iOS versions allowing attackers to execute…

2 years ago
Complete Guide & Best Practices for Enterprise Mobile Device Security to Protect From Malware AttacksComplete Guide & Best Practices for Enterprise Mobile Device Security to Protect From Malware Attacks

Complete Guide & Best Practices for Enterprise Mobile Device Security to Protect From Malware Attacks

Nowadays, employees, customers, and stakeholders at all levels are adopting BYOD onboarding practices. Fortunately, it's entirely possible for companies to…

5 years ago
RCS – New Android Text Messaging Service Let Hackers to Take Full Control of User AccountsRCS – New Android Text Messaging Service Let Hackers to Take Full Control of User Accounts

RCS – New Android Text Messaging Service Let Hackers to Take Full Control of User Accounts

RCS expanded as Rich Communications Services is the next generation SMS protocol aimed to replace the SMS and MMS services.…

5 years ago
Most Important Steps to Keep Your Mobile Safe From Sophisticated Cyber ThreatsMost Important Steps to Keep Your Mobile Safe From Sophisticated Cyber Threats

Most Important Steps to Keep Your Mobile Safe From Sophisticated Cyber Threats

Mobile phones have become a part of everyday life, and their functionality continues to develop at a rapid pace. You…

6 years ago
Most Important Security Practices to Keep Your iPhone Away From Cyber CriminalsMost Important Security Practices to Keep Your iPhone Away From Cyber Criminals

Most Important Security Practices to Keep Your iPhone Away From Cyber Criminals

It is likely your iPhone stores a substantial amount of personal data, which you wouldn’t want to fall into the…

6 years ago
Mobile Security Testing to Protect Your Applications From Cyber ThreatsMobile Security Testing to Protect Your Applications From Cyber Threats

Mobile Security Testing to Protect Your Applications From Cyber Threats

Owing to the sudden increase in the use of smartphones, tablets and other mobile devices, mobile application these days are…

6 years ago