HackDig : Dig high-quality web security articles for hacker

Lost or Stolen Device? Here’s What to do Next

Reading Time: ~ 4 min. It’s a nightmare, it’s inconvenient, and it’s inevitable. Losing or having your smart device stolen poses a significant, looming privacy risk— we just don’t like to think about it. However, this is an instance where hiding your head in the sand will only make you more susceptible to attack. The personal data living on your family&#
Publish At:2020-04-01 09:03 | Read:41 | Comments:0 | Tags:Home + Mobile android ios

No, Houseparty hasn’t hacked your phone and stolen your bank details

byPaul DucklinIf you’re at home right now – and who isn’t? – then you’ve probably heard of Houseparty.It’s a social networking app that came out back in 2015 and was bought by Epic Games – famous for Unreal and Fortnite – in the middle of 2019.The name gives you a good idea of what is does: simply put, you go o
Publish At:2020-03-30 17:20 | Read:150 | Comments:0 | Tags:Android Exploit hacking Houseparty ios

Cyber News Rundown: WHO Under Cyberattack

Reading Time: ~ 2 min. World Health Organization Sees Rise in Cyberattacks Officials for the World Health Organization (WHO) have announced that many of their sites and servers have been under attack by unsuccessful hackers trying to capitalize on the latest health scare. The attack stemmed from the use of several malicious domains that attempted to gain
Publish At:2020-03-27 16:10 | Read:273 | Comments:0 | Tags:Industry Intel android data breach

Android apps are snooping on your installed software

byDanny BradburyAndroid apps are snooping on other software on your device – and that could tell shady advertising companies more about you than you’d like.The news emerged this week in a paper from researchers in Italy, the Netherlands, and Switzerland. The privacy violations centre around installed application methods (IAMs), which are applicat
Publish At:2020-03-27 10:24 | Read:285 | Comments:0 | Tags:Android Google Mobile Operating Systems Privacy Security thr

Operation Poisoned News: Hong Kong Users Targeted With Mobile Malware via Local News Links

By Elliot Cao, Joseph C. Chen, William Gamazo Sanchez, Lilang Wu, and Ecular Xu A recently discovered watering hole attack has been targeting iOS users in Hong Kong. The campaign uses links posted on multiple forums that supposedly lead to various news stories. While these links lead users to the actual news sites, they also use a hidden iframe to load and e
Publish At:2020-03-26 08:38 | Read:179 | Comments:0 | Tags:Malware Mobile android dmsSpy iOS lightSpy Operation Poisone

TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany

IBM X-Force researchers recently analyzed an Android malware app that’s likely being pushed to infected users by the TrickBot Trojan. This app, dubbed “TrickMo” by our team, is designed to bypass strong authentication methods that bank customers use when they need to authorize a transaction. Though it’s not the first of its kind, this
Publish At:2020-03-24 07:55 | Read:183 | Comments:0 | Tags:Advanced Threats Risk Management Threat Intelligence Android

MonitorMinor, the outstanding stalkerware can track Gmail, WhatsApp, Instagram, and Facebook

Security experts spotted a new stalkerware, dubbed MonitorMinor, that can track Gmail, WhatsApp, Instagram, and Facebook user activity. Security experts from Kaspersky Lab spotted a new stalkerware, dubbed MonitorMinor (Monitor.AndroidOS.MonitorMinor.c), that can track Gmail, WhatsApp, Instagram, and Facebook user activity. Stalkerware is commercial m
Publish At:2020-03-16 11:15 | Read:274 | Comments:0 | Tags:Breaking News Malware Mobile Android hacking news IT malware

Cookiethief: a cookie-stealing Trojan for Android

We recently discovered a new strain of Android malware. The Trojan (detected as: Trojan-Spy.AndroidOS.Cookiethief) turned out to be quite simple. Its main task was to acquire root rights on the victim device, and transfer cookies used by the browser and Facebook app to the cybercriminals’ server. The exact means by which the Trojan was able to infect c
Publish At:2020-03-12 06:26 | Read:265 | Comments:0 | Tags:Featured Malware descriptions Android Malware Technologies M

Dissecting Geost: Exposing the Anatomy of the Android Trojan Targeting Russian Banks

The Android banking trojan Geost was first revealed in a research by Sebastian García, Maria Jose Erquiaga and Anna Shirokova from the Stratosphere Laboratory. They detected the trojan by monitoring HtBot malicious proxy network. The botnet targets Russian banks, with the victim count at over 800,000 users at the time the study was published in Virus Bulleti
Publish At:2020-03-05 10:13 | Read:259 | Comments:0 | Tags:Malware Mobile android Geost

Google addresses over 70 flaws in Android, including a remotely exploitable issue

Google’s March 2020 security updates for Android address over 70 flaws, including a critical vulnerability that affects the media framework.  Google’s March 2020 security updates for Android include the fix for a critical vulnerability, tracked as CVE-2020-0032, that affects the media framework as part of the 2020-03-01 security patch level. The 2020-0
Publish At:2020-03-04 06:17 | Read:293 | Comments:0 | Tags:Breaking News Mobile Security Android Google information sec

SurfingAttack – hacking phones via ultrasonic waves

SurfingAttack is an attacking technique that allows to wake up mobile device and control them using voice commands encoded in ultrasonic waves. SurfingAttack is a hacking technique that sees voice commands encoded in ultrasonic waves silently activate a mobile phone’s digital assistant. The technique could be used to do several actions such as maki
Publish At:2020-03-02 12:33 | Read:368 | Comments:0 | Tags:Breaking News Hacking Mobile Android Apple Google Assistant

Facebook sues data analytics firm OneAudience over malicious SDK

byLisa VaasFacebook is suing the data analytics firm OneAudience for allegedly developing a malicious, social-media-profile-grabbing software development kit (SDK) and then paying app developers to embed it in their apps.In a complaint filed in California on Thursday, Facebook charged that the polluted apps – which included shopping, gaming and utility
Publish At:2020-03-02 09:21 | Read:281 | Comments:0 | Tags:Android Data loss Facebook iOS Law & order Mobile Privacy Se

Siri and Google Assistant hacked in new ultrasonic attack

byJohn E DunnUnsettling news for anyone who relies on smartphone voice assistants: researchers have demonstrated how these can be secretly activated to make phone calls, take photos, and even read back text messages without ever physically touching the device.Dubbed SurfingAttack by a US-Chinese university team, this is no parlor trick and is based on the ab
Publish At:2020-03-02 09:21 | Read:200 | Comments:0 | Tags:Apple Google Privacy Samsung Security threats Android Bixby

New strain of Cerberus Android banking trojan can steal Google Authenticator codes

Experts found a new version of the Cerberus Android banking trojan that can steal one-time codes generated by the Google Authenticator app and bypass 2FA. Security researchers from ThreatFabric warn of a new Android malware strain can now steal one-time passcodes (OTP) generated through Google Authenticator that is used as part of 2FA to protect online ac
Publish At:2020-02-27 09:54 | Read:331 | Comments:0 | Tags:Breaking News Cyber Crime Malware Mobile Android Cerberus it

Google removed nearly 600 apps from the Play Store for ad policy violation

Google announced to have removed nearly 600 Android apps in the official Play Store that were violating two ad-related policies. Google removed from the official Play Store nearly 600 Android apps that were violating two ad-related policies, it also banned the same apps from Google AdMob and Google Ad Manager. “As part of our ongoing efforts —
Publish At:2020-02-22 08:56 | Read:397 | Comments:0 | Tags:Mobile Security Android hacking news information security ne


Share high-quality web security related articles with you:)


Tag Cloud