HackDig : Dig high-quality web security articles for hackers

An iOS hacker tries Android

@import url('https://themes.googleusercontent.com/fonts/css?kit=lhDjYqiy3mZ0x6ROQEUoUw');ol.lst-kix_m7n4vga7agj0-8.start{counter-reset:lst-ctn-kix_m7n4vga7agj0-8 0}ol.lst-kix_s7qtkfn3qfov-6.start{counter-reset:lst-ctn-kix_s7qtkfn3qfov-6 0}.lst-kix_2atftb74ca0r-5>li{counter-increment:lst-ctn-kix_2atftb74ca0r-5}ol.lst-kix_lgfdoxi035fa-6.start{counter-r
Publish At:2020-12-27 09:03 | Read:212 | Comments:0 | Tags: IOS android hack

Apple Security 2020: The Year in Review

As we all know, 2020 was an exceptional year. No one expected the global turmoil we have seen, but this hasn’t stopped people from working with computers. If anything, the fact that so many people work from home means that they need to have extra protection from malware, vulnerabilities, and other security threats. These threats can be classified in se
Publish At:2020-12-21 17:08 | Read:233 | Comments:0 | Tags:Security & Privacy Apple iOS iPad iPhone Mac phishing vulner

CISOs and CIOs: Protecting Traditional Endpoints Isn’t Enough

As government cyber teams feverishly perform damage control from the SolarWinds hack, one major question for CISOs and CIOs cannot be ignored: “Protecting traditional endpoints isn’t enough; how am I going to assess and protect my mobile devices?”   Threat visibility comes from sensors, and if your mobile devices don’t utilize a mobile threat defense (MTD)
Publish At:2020-12-16 14:51 | Read:101 | Comments:0 | Tags:Mobile Threat Defense advanced mobile threat defense breach

iOS Spyware Emerges in Longstanding Extortion Campaign

An extortion campaign targeting Chinese, Korean, and Japanese speakers recently started using a new piece of spyware, mobile security firm Lookout reported on Wednesday.The campaign is focused on infecting iOS and Android of illicit sites, such as those offering escort services, in order to steal personal information, likely with the intent to blackmail or e
Publish At:2020-12-16 12:53 | Read:158 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Virus & Threats Frau

Sextortion campaign uses Goontact spyware to target Android and iOS users

Security experts spotted a new malware strain, named Goontact, that allows its operators to spy on both Android and iOS users. Security researchers from Lookout have discovered new spyware, dubbed Goontcat, that could target both Android and iOS users. Goontact implement common spyware features, including the ability to gather data from the infected de
Publish At:2020-12-16 10:18 | Read:137 | Comments:0 | Tags:Breaking News Hacking Malware Mobile Android Goontact hackin

APPLE-SA-2020-12-14-1 iOS 14.3 and iPadOS 14.3

-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA256APPLE-SA-2020-12-14-1 iOS 14.3 and iPadOS 14.3iOS 14.3 and iPadOS 14.3 addresses the following issues.Information about the security content is also available athttps://support.apple.com/HT212003.App StoreAvailable for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4and later, and iPod touch (7th generatio
Publish At:2020-12-15 14:51 | Read:359 | Comments:0 | Tags: IOS

APPLE-SA-2020-12-14-2 iOS 12.5

-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA256APPLE-SA-2020-12-14-2 iOS 12.5iOS 12.5 addresses the following issues. Information aboutthe security content is also available athttps://support.apple.com/HT212004.SecurityAvailable for: iPhone 5s, iPhone 6, iPhone 6 Plus, iPad Air, iPadmini 2, iPad mini 3, and iPod touch (6th generation)Impact: Unauthorized code
Publish At:2020-12-15 14:51 | Read:277 | Comments:0 | Tags: IOS

Apple addressed multiple code execution flaws in iOS and iPadOS

Apple addressed this week serious code execution vulnerabilities that affect its iOS and iPadOS mobile operating systems. Apple released security updates to fix multiple severe code execution vulnerabilities in its iOS and iPadOS mobile operating systems. The IT giant released iOS 14.3 and iPadOS 14.3 version to address eleven security vulnerabilities,
Publish At:2020-12-15 03:06 | Read:167 | Comments:0 | Tags:Breaking News Mobile Security Apple Hacking hacking news inf

Apple Patches Code Execution Flaws iOS and iPadOS

Apple on Monday released a major point-upgrade to its flagship iOS and iPadOS mobile operating systems to patch a handful of serious security vulnerabilities.The iOS 14.3 and iPadOS 14.3 release will provide cover for 11 documented security flaws, some serious enough to expose iPhones and iPads to code execution attacks.The most serious of the bugs could all
Publish At:2020-12-14 17:59 | Read:170 | Comments:0 | Tags:Endpoint Security Mobile Security NEWS & INDUSTRY Email

S3 Ep10: Hacking iPhones, sunken Enigmas and double scams

byPaul DucklinIn this episode, we dig into research that figured out a way to steal data from iPhones wirelessly; we tell the fascinating story of how environmentalist divers in Germany came across an old Enigma cipher machine at the bottom of the Baltic sea; and we give you advice on how to talk to phone scammers.With Kimberly Truong, Doug Aamoth and Paul D
Publish At:2020-12-10 10:43 | Read:280 | Comments:0 | Tags:Apple iOS Podcast Privacy Spam Cryptography enigma Exploit h

‘Scariest iPhone Hack Ever’ Illustrates Importance of Protecting Mobile Devices

It’s been called the ‘scariest iPhone hack ever.’ According to a recent Ars Technica article, “Earlier this year, Apple patched one of the most breathtaking iPhone vulnerabilities ever: a memory corruption bug in the iOS kernel that gave attackers remote access to the entire device – over Wi-Fi, with no user interaction required at a
Publish At:2020-12-04 10:21 | Read:156 | Comments:0 | Tags:Mobile Security advanced mobile threat defense cyber securit

TrickBot Malware Scans Systems for UEFI/BIOS Vulnerabilities

TrickBot has been updated with functionality that allows it to scan the UEFI/BIOS firmware of the targeted system for vulnerabilities, security researchers have discovered.Around since 2016, the malware recently survived a takedown attempt that resulted in most of its command and control (C&C) domains becoming unresponsive. Since then, however, it receiv
Publish At:2020-12-03 12:53 | Read:271 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Virus & Threats Vi

How to steal photos off someone’s iPhone from across the street

byPaul DucklinWell-known Google Project Zero researcher Ian Beer has just published a blog post that is attracting a lot of media attention.The article itself has a perfectly accurate and interesting title, namely: An iOS zero-click radio proximity exploit odyssey.But it’s headlines like the one we’ve used above that capture the practical essence
Publish At:2020-12-02 15:31 | Read:400 | Comments:0 | Tags:Apple iOS Vulnerability Exploit hacking Ian Beer Project Zer

Why Leading Cities and States Should be Protecting ‘Digital Citizens’ from Mobile Threats

When most people think of Zimperium, they may recognize us as the leader in enterprise mobile device and app security. Or, they have seen the recent news on the Defense Information Systems Agency (DISA), a U.S. Department of Defense (DoD) organization, selecting us to deliver comprehensive Mobile Endpoint Protection (MEP) to the unclassified government furn
Publish At:2020-12-01 09:35 | Read:242 | Comments:0 | Tags:Mobile Security Mobile Threat Defense advanced mobile threat

Manage and Secure Notifications on Your iPhone, iPad, and Mac

In general, our computing devices are passive. They perform tasks for us when we click buttons or enter some text, but otherwise they just wait for our commands. With the rise of mobile devices, "push" notifications became a way for our devices to alert us when certain things happen. We can get notified when we get text messages, phone calls, or em
Publish At:2020-12-01 05:44 | Read:300 | Comments:0 | Tags:How To iOS iPadOS macOS notifications


Tag Cloud