OnePlus Suffers New Data Breach Impacting Its Online Store Customers

Chinese smartphone maker OnePlus has suffered a new data breach exposing personal and order information of an undisclosed number of its customers, likely, as a result of a vulnerability in its online store website.

The breach came to light after OnePl… Continue reading OnePlus Suffers New Data Breach Impacting Its Online Store Customers

Mysterious malware that re-installs itself infected over 45,000 Android Phones

Over the past few months, hundreds of Android users have been complaining online of a new piece of mysterious malware that hides on the infected devices and can reportedly reinstall itself even after users delete it, or factory reset their devices.

Du… Continue reading Mysterious malware that re-installs itself infected over 45,000 Android Phones

SIM Cards in 29 Countries Vulnerable to Remote Simjacker Attacks

Until now, I’m sure you all might have heard of the SimJacker vulnerability disclosed exactly a month ago that affects a wide range of SIM cards and can remotely be exploited to hack into any mobile phone just by sending a specially crafted binary SMS…. Continue reading SIM Cards in 29 Countries Vulnerable to Remote Simjacker Attacks

A quick update on 2019 mobile predictions made in January.

So far this year, the surreptitious capture of audio and visual data via smartphone cameras and microphones has negatively impacted the world’s richest person and a beloved trillion-dollar company. It’s safe to say that awareness of th… Continue reading A quick update on 2019 mobile predictions made in January.

How Apple Shapes the Narrative About Smartphone Security

In August, we conducted our annual survey designed to gauge attitudes about mobile security and privacy. In looking behind this year’s numbers, I was struck by how shifting perspectives seem to mirror the goings-on in the world of Apple. As … Continue reading How Apple Shapes the Narrative About Smartphone Security

0-Days Found in iPhone X, Samsung Galaxy S9, Xiaomi Mi6 Phones

At Pwn2Own 2018 mobile hacking competition held in Tokyo on November 13-14, white hat hackers once again demonstrated that even the fully patched smartphones running the latest version of software from popular smartphone manufacturers can be hacked.

T… Continue reading 0-Days Found in iPhone X, Samsung Galaxy S9, Xiaomi Mi6 Phones

Ex-NSO Employee Caught Selling Stolen Phone Hacking Tool For $50 Million

A former employee of one of the world’s most powerful hacking companies NSO Group has been arrested and charged with stealing phone hacking tools from the company and trying to sell it for $50 million on the Darknet secretly.

Israeli hacking firm NSO … Continue reading Ex-NSO Employee Caught Selling Stolen Phone Hacking Tool For $50 Million

Researchers Uncover New Attacks Against LTE Network Protocol

If your mobile carrier offers LTE, also known as the 4G network, you need to beware as your network communication can be hijacked remotely.

A team of researchers has discovered some critical weaknesses in the ubiquitous LTE mobile device standard that… Continue reading Researchers Uncover New Attacks Against LTE Network Protocol

New Rowhammer attack can be used to hack Android devices remotely

Researchers from Vrije Universiteit in Amsterdam have demonstrated that it is possible to use a Rowhammer attack to remotely hack Android phones. What is a Rowhammer attack? “The Rowhammer attack targets the design of DRAM memory. On a system whe… Continue reading New Rowhammer attack can be used to hack Android devices remotely