HackDig : Dig high-quality web security articles for hacker

Fake 'checkra1n' iOS Jailbreak Offered in Click Fraud Scheme

iPhone owners looking to jailbreak their devices have been warned that a fake checkra1n jailbreak is being offered as part of a sophisticated click fraud scheme featuring techniques that could be used for far more malicious actions.A researcher specializing in iOS security, known online as axi0mX, last month released the source code of an iOS exploit that ca
Publish At:2019-10-15 12:00 | Read:121 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Fraud & Identity The

Majority of Simjacker Attacks Aimed at Mobile Phones in Mexico

Researchers believe hundreds of millions of SIM cards may be vulnerable to Simjacker attacks after determining that the targeted technology, despite being very old, is still used by at least 61 mobile operators across 29 countries.AdaptiveMobile Security, a firm that specializes in cyber telecoms security, last month warned of a new SIM card attack method du
Publish At:2019-10-14 12:00 | Read:219 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Wireless Security Vulner

Top Three Mobile Phishing Lures: #2) Malicious Apps

People are slowly learning to be careful about providing their credentials when prompted by an email or phone call, but hackers are getting more creative and tricking users into giving their credentials when users think they’re just signing into their mobile app.  For example, BankBot is Android-targeting malware using fake overlay screens to mimic existing
Publish At:2019-10-09 07:50 | Read:203 | Comments:0 | Tags:Mobile Security Mobile Threat Defense advanced mobile threat

Google Patches Remote Code Execution Bugs in Android 10

Google’s October 2019 set of security patches for Android address a total of 26 vulnerabilities in the operating system, including a couple of remote code execution bugs impacting Android 10.The most important of these vulnerabilities are three remote code execution flaws in the Media framework (CVE-2019-2184, CVE-2019-2185, and CVE-2019-2186), all three rat
Publish At:2019-10-08 12:00 | Read:129 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Vulnerabilities Mobile &

Stay Smart Online Week 2019

Let’s Reverse the Threat of Identity Theft!! Our online identities are critical. In fact, you could argue that they are our single most unique asset. Whether we are applying for a job, a mortgage or even starting a new relationship, keeping our online identity protected, secure and authentic is essential. This week is Stay Smart Online Week in Australia R
Publish At:2019-10-07 23:20 | Read:217 | Comments:0 | Tags:Consumer Identity Protection antivirus cybercrime cybersafet

Signal Rushes to Patch Serious Eavesdropping Vulnerability

The developers of the popular privacy-focused messaging application Signal have rushed to patch a serious vulnerability in the Android version that can be exploited by an attacker to eavesdrop on users.The flaw, tracked as CVE-2019-17191, was discovered by Google Project Zero researcher Natalie Silvanovich. The issue was reported to Signal developers in late
Publish At:2019-10-07 12:00 | Read:267 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Privacy Vulnerabilities

Is Your Browser Haunted With Ghostcat Malware?

October is finally among us, and things are spookier than usual. One ghost causing some hocus pocus across the World Wide Web is Ghostcat-3PC, a browser-hijacking malware that has launched at least 18 different malvertising campaigns in the last three months. According to SC Magazine, Ghostcat’s goal is to hijack users’ mobile browsing sessions and is specif
Publish At:2019-10-04 23:20 | Read:7717 | Comments:0 | Tags:Consumer Threat Notices cybersecurity malware mobile securit

Zero-Day Used in the Wild Impacts Pixel 2, Other Android Phones

Fully patched Pixel 2 devices, even those running Android 10 preview, are impacted by a vulnerability that has already been abused in attacks, a Google Project Zero security researcher has discovered.The issue, tracked as CVE-2019-2215, is a use-after-free in the binder driver that could result in an exploitable crash, Project Zero researcher Maddie Stone re
Publish At:2019-10-04 12:00 | Read:311 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Virus & Threats Vuln

Google Expands Use of Password Checkup Tool, Unveils New Privacy Features

Google on Wednesday announced that its Password Checkup tool has been added to the Account password manager, and the company has unveiled some new security and privacy features for YouTube, Maps and Assistant.Launched in February 2019 as an extension for Chrome, Password Checkup is designed to display a warning whenever users log in to a website with credent
Publish At:2019-10-02 12:00 | Read:243 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Privacy Email Security I

Aussies Fear Snakes, Spiders and Getting Hacked

Fears and phobias. We all have them. But what are your biggest ones? I absolutely detest snakes but spiders don’t worry me at all. Well, new research by McAfee shows that cybercriminals and the fear of being hacked are now the 5th greatest fear among Aussies. With news of data breaches and hacking crusades filling our news feed on a regular basis, many of us
Publish At:2019-10-02 11:20 | Read:199 | Comments:0 | Tags:Consumer Identity Protection computer security cybercrime cy

Zimperium Recognized with “Overall Mobile Security Solution of the Year” Award in 2019 CyberSecurity Breakthrough Awards

The CyberSecurity Breakthrough Awards announced today that Zimperium won “Overall Mobile Security Solution of the Year” award. CyberSecurity Breakthrough is a leading independent market intelligence organization that recognizes the top companies, technologies and products in the global information security market today.  Our machine learning-based engine, z
Publish At:2019-10-02 09:10 | Read:95 | Comments:0 | Tags:Awards Mobile Security Mobile Threat Defense advanced mobile

Top Three Mobile Phishing Lures: #1) Email

According to a SecurityWeek article, “With over 66% of emails first opened on a mobile device and email arguably the first point of attack for a phishing actor, unprotected emails on a mobile device can easily turn into a new avenue for attack.”  Furthermore, it’s not just corporate email that you have to worry about. Users check their personal emails from
Publish At:2019-10-02 07:50 | Read:244 | Comments:0 | Tags:Mobile Security Mobile Threat Defense advanced mobile threat

Augmenting Intune with Zimperium’s MTD

According to our latest State of Enterprise Mobile Report, mobile devices continue to be the target of attack at increasing rates. There is a relatively simple explanation for this – in a typical organization today, 60 percent of the endpoints containing or accessing enterprise data are mobile; the majority of which do not have any security protection
Publish At:2019-09-30 12:30 | Read:229 | Comments:0 | Tags:Mobile Security Mobile Threat Defense advanced mobile threat

Apple Patches iOS 13 Bug Allowing Third-Party Keyboards "Full Access"

Apple on Friday released security updates for iOS 13 and iPadOS to address a vulnerability that allowed third-party keyboard extensions to gain “full access” without being granted permission.The bug, Apple revealed earlier this week, only impacts devices where third-party keyboards request full access permissions, but does not affect Apple keyboards or third
Publish At:2019-09-28 12:00 | Read:237 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Privacy Vulnerabilities

Researchers Disclose Another SIM Card Attack Possibly Impacting Millions

A new variant of a recently disclosed SIM card attack method could expose millions of mobile phones to remote hacking, researchers have warned.Earlier this month, cyber telecoms security firm AdaptiveMobile Security disclosed the details of Simjacker, an attack method that involves sending specially crafted SMS messages to the targeted mobile phone.The attac
Publish At:2019-09-27 12:00 | Read:260 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Vulnerabilities Mobile &

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud