How widespread is mercenary spyware?

A targeted hunt on 2,500 mobile devices for indicators of compromise associated with mercenary spyware has revealed that its use is not as rare as one would hope. The results of the hunt Earlier this year, iVerify added a threat hunting feature to its … Continue reading How widespread is mercenary spyware?

Outmaneuvering cybercriminals by recognizing mobile phishing threats’ telltale markers

Preventative medicine has long been recognized as a vital approach in safeguarding our physical health. We take a variety of tests and assessments so that doctors can uncover key biological markers that may indicate the potential development of certain… Continue reading Outmaneuvering cybercriminals by recognizing mobile phishing threats’ telltale markers

Open Firmware For PinePhone LTE Modem – What’s Up With That?

In their monthly announcement, among all the cool things Pine64, they talked about the open firmware for PinePhone’s LTE modem. The firmware isn’t fully open – a few parts remain …read more Continue reading Open Firmware For PinePhone LTE Modem – What’s Up With That?

Notkia: Building An Open And Linux-Powered Numpad Phone

Two Nokia 1860 phones side by side - a Notkia-modded phone on the right, and an unmodified Nokia phone on the left

Many of us hackers have a longing for numpad-adorned mobile phones. We also have a shared understanding that, nowadays, such a phone has to be open and Linux-powered. Today’s project, …read more Continue reading Notkia: Building An Open And Linux-Powered Numpad Phone

Lack of emphasis on secure teleworking is a national security risk.

Commercial mobile devices without proper protections are creating risks to our National Security.

The post Lack of emphasis on secure teleworking is a national security risk. appeared first on Security Boulevard.
Continue reading Lack of emphasis on secure teleworking is a national security risk.

Hackers Can Use Ultrasonic Waves to Secretly Control Voice Assistant Devices

Researchers have discovered a new means to target voice-controlled devices by propagating ultrasonic waves through solid materials in order to interact with and compromise them using inaudible voice commands without the victims’ knowledge.

Called “Sur… Continue reading Hackers Can Use Ultrasonic Waves to Secretly Control Voice Assistant Devices