smartphone

Converting Your Android Smartphone into Penetration Testing Device

Android Phone Penetration Testing, Big corporations trying to improve the user experience by making everything around simplify, increasing performance and…

2 years ago

How To Stop Cyber Criminals to Spy & Track Your Smartphone

Many smartphone users are surprised when they get a pop up as soon as they leave a place asking them…

6 years ago

Warning Signs of Your Smartphone Getting Hacked

It’s one of the worst feelings in the world having your computer hacked, hit with a virus and losing all…

6 years ago

Critical Remote Code Execution on all Mainstream LG Smartphone Models

Multiple Critical vulnerabilities patched by LG that resides on default keyboard on allmainstream LG smartphone models. Both the vulnerabilities allow…

7 years ago

Hackers can Recover Smart Phone PIN by combining Data Available in Sensors

Security PIN plays a vital role in protecting sensitive application such as banking applications, Wallets, and unlocking screen. It remains…

7 years ago

Millions of Smartphones are Vulnerable to inject Backdoor via open Ports

[jpshare]A Recent Research Revealed by University of Michigan  Research team, Open Ports Create Backdoors in Millions of Smartphones .This Vulnerability Existing…

8 years ago

Within five attempts Android device’s Pattern Lock can be cracked

New research from Lancaster University, Northwest University in China, and the University of Bath, which profited from subsidizing from the…

8 years ago