HackDig : Dig high-quality web security articles for hacker

Chinese researchers from Tencent hacked a Tesla model once again

A team of security researchers from Chinese firm Tencent has once again demonstrated how to remotely hack a Tesla Model vehicle. Security researchers from Chinese firm Tencent have once again demonstrated how to remotely hack a Tesla Model vehicle. Once the experts reported the flaws to the car makers it promptly patched them. In a video PoC of the attack,
Publish At:2017-07-29 17:25 | Read:368 | Comments:0 | Tags:Breaking News Hacking mobile app Tesla car Tesla Model X

How to steal a Tesla car by hacking the mobile app

A group of researchers from the security firm Promon has demonstrated how cyber criminals could take control of the Tesla Car and steal it. A group of security experts from security firm Promon has demonstrated how to exploit the Tesla app (for both Android and iOS) to locate, unlock and steal a Tesla Model S. The hackers used a laptop to remotely control th
Publish At:2016-11-25 09:00 | Read:852 | Comments:0 | Tags:Breaking News Hacking mobile app Tesla car

WiFox mobile app shows names and passwords for Wi-Fi airports networks worldwide

The WiFox mobile app was designed as a huge container of network names and passwords for Wi-Fi airports networks worldwide. Do you travel a lot? Probably you have already read about WiFox, it is a legitimate Android/iOS mobile app that includes indications of thousands of airport Wi-Fi networks and their passwords. We have spoken several times about the risk
Publish At:2016-10-05 19:55 | Read:722 | Comments:0 | Tags:Breaking News Mobile Security Airport Wi-Fi hotspots banking

Bank Hack – How to steal $25 Billion with a few lines of code

A security expert discovered security flaws that could let anyone to steal as much as $25 Billion from one of the biggest Indian banks. The security researcher Sathya Prakash discovered that the critical vulnerabilities reside in the mobile banking application used by the bank customers. Prakash explained that the exploitation of the flaw allowed him to stea
Publish At:2016-05-17 22:35 | Read:1020 | Comments:0 | Tags:Breaking News Hacking Security bank hack Certificate Pinning

SideStepper method allows to infect iOS devices via MDM Solutions

SideStepper is a method to install malicious apps on iOS devices by abusing the mobile device management (MDM) solutions. Security researchers from the Check Point firm have devised a method to install a malicious code on iOS devices by abusing the mobile device management (MDM) solutions used by many enterprises. The technique relies on a vulnerability dubb
Publish At:2016-04-01 03:35 | Read:1105 | Comments:0 | Tags:Breaking News Hacking Mobile Security Apple iOS iOS malware

Fitbit trackers can be infected with a malware in just 10 seconds

A security expert conducted a series of tests on the Fitbit trackers discovering how they can be infected with a malware in just 10 seconds. The security researcher Axelle Apvrille revealed that infect Fitbit trackers with a malware is too easy. Axelle Apvrille has managed to infect FitBit Flex fitness tracker and uses them
Publish At:2015-10-22 22:20 | Read:950 | Comments:0 | Tags:Breaking News Hacking Bluetooth y Fitbit trackers fitness iB

Advertising hijacking made by Invisible rogue mobile apps are wasting petabytes of data a day

Mobile Malware is growing and crooks are targeting the advertising industry to redirect users to ad pages in a sort of Advertising hijacking. Mobile Malware is growing and crooks are targeting the advertising industry with malicious codes able to redirect users to ad pages, this practice is known as Advertising hijacking. Thes
Publish At:2015-07-27 16:15 | Read:770 | Comments:0 | Tags:Breaking News Cyber Crime Malware Mobile Reports advertising

Bogus News mobile App discovered in Hacking Team arsenal

Experts at Trend Micro have discovered a malicious Android App while they were analyzing the package of data stolen from Hacking Team. Experts at Trendmicro analyzing package of data stolen from Hacking Team systems discovered a fake news app that was designed to circumvent filtering in Google Play. The malicious app was downl
Publish At:2015-07-18 04:25 | Read:810 | Comments:0 | Tags:Breaking News Hacking Intelligence Malware Mobile Security A

Mobile App Data Flaw Places Users’ Information at Risk

Security researchers have discovered a flaw in the way mobile apps store data online, which is jeopardizing users’ sensitive information, including passwords, door codes, and location data.According to Reuters, a team of German researchers studied as many as ten thousand mobile applications, which included social networking, medical, and banking apps,
Publish At:2015-06-17 08:30 | Read:849 | Comments:0 | Tags:Latest Security News Authentication Fraunhofer Institute for

How to easily hack a WhatsApp Account?

TheHackerNews has reported a simple trick that allows to hijack a WhatsApp account easily on every mobile platform by knowing the victim’s phone number. The popular mobile messaging app WhatsApp is vulnerable to hijacking exposing hundreds of Millions of users vulnerable to attack. It could be quite easy to take over a
Publish At:2015-06-05 09:10 | Read:1187 | Comments:1 | Tags:Breaking News Hacking Mobile account hijacking mobile mobile

Stop!t: The Newest App To Curb Cyberbullying

Apps created by a parent has been popping up on state news now and then for the past few months. A mom from Houston who created Ignore No More, a mobile app designed to completely shut down a phone should kids choose not to answer calls or text messages from parents, may have come to mind. Or the dad from Arizona who built a company around My Job Chart, whic
Publish At:2015-03-05 02:00 | Read:752 | Comments:0 | Tags:Online Security cyberbullying mobile app

PowerSpy – How to spy on mobile users by monitoring the power supply

A group of researchers has proposed a new technique dubbed PowerSpy to track mobile users’ location by analyzing data related to the power supply. A group of researchers at Stanford University and the Israeli defense company Rafael has discovered a way to track mobile devices by analyzing the power supply. The experts have pro
Publish At:2015-02-22 05:15 | Read:1115 | Comments:0 | Tags:Hacking Mobile Security Android mobile mobile app mobile pho

Fake WhatsApp for Web offered in the wild

Cybercriminals are offering worldwide a fake WhatsApp for Web in spam campaign with the intent to serve banking malware and run other kinds of scams. Recently WhatsApp launched its web service that could be used by using Google Chrome and allows users to access all the conversations and messages from the mobile device. “
Publish At:2015-02-07 19:30 | Read:1234 | Comments:0 | Tags:Cyber Crime Malware Mobile Security banking trojan Cybercrim

Spammers Take A Liking to WhatsApp Mobile App

Spammers have settled in on the WhatsApp messaging platform with greater regularity, aided in one locale, by of all things, government regulations.Researchers at AdaptiveMobile yesterday published a report that exposed a number of spam campaigns peddling phony handbags and sunglasses, investment scams, pornography, and more that are moving over the platform,
Publish At:2015-01-16 19:25 | Read:1282 | Comments:0 | Tags:Mobile Security Web Security AdaptiveMobile Facebook messagi

Fend Off Cyber Attacks This Holiday Season and Into 2015!

With 2015 year in full swing, people are ready to begin a fresh start. But let’s not give cybercriminals a fresh start to to scam us. Being well aware of the feelings of bonhomie and genorosity that permeate the human spirit this time of the year, scamsters think up ingenuous and ever-changing strategies to get what they want; including an entry pass to your
Publish At:2015-01-06 19:40 | Read:1278 | Comments:0 | Tags:Consumer Family Safety cybersafety mobile app mobile securit

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud