Android unlock patterns are a boon for shoulder surfing attackers

The “swiping” unlock patterns typical for Android devices are considerably easier for attackers to discern than PIN combinations. In fact, after only one observation of a user entering the pattern, 64% of shoulder surfing attackers will be able to reproduce it, a group of researchers from the US Naval Academy and the University of Maryland Baltimore County has found. In comparison, only one in ten attackers could make out a six-digit PIN after one viewing. … More Continue reading Android unlock patterns are a boon for shoulder surfing attackers

BlueBorne: Critical Bluetooth Attack Puts Billions of Devices at Risk of Hacking

If you are using a Bluetooth enabled device, be it a smartphone, laptop, smart TV or any other IoT device, you are at risk of malware attacks that can carry out remotely to take over your device even without requiring any interaction from your side.

Security researchers have just discovered total 8 zero-day vulnerabilities in Bluetooth protocol that impact more than 5.3 Billion devices—from

Continue reading BlueBorne: Critical Bluetooth Attack Puts Billions of Devices at Risk of Hacking

Hacking smartphones with malicious replacement parts

Smartphone users can now add a new entry to the list of things they need to worry about: their phones being compromised via replacement parts. A group of researchers from Ben-Gurion University of the Negev has demonstrated that hardware replacements – e.g. touchscreens, NFC readers, wireless charging controllers, and so on – can be equipped with a chip that is capable of manipulating the device’s communication. And even though they haven’t gone through the trouble … More Continue reading Hacking smartphones with malicious replacement parts

Decryption key for Apple iOS Secure Enclave Processor firmware revealed

A hacker that goes by the handle “xerub” has apparently figured out the decryption key for Apple’s Secure Enclave Processor (SEP) firmware, and made it available online: key is fully grown https://t.co/MwN4kb9SQI use https://t.co/I9fLo5Iglh to decrypt and https://t.co/og6tiJHbCu to process — ~ (@xerub) August 16, 2017 What is the Secure Enclave? To quote Apple: The Secure Enclave is a coprocessor fabricated in the Apple S2, Apple A7, and later A-series processors. It uses encrypted memory … More Continue reading Decryption key for Apple iOS Secure Enclave Processor firmware revealed

How CIA Agents Covertly Steal Data From Hacked Smartphones (Without Internet)

WikiLeaks has today published the 16th batch of its ongoing Vault 7 leak, this time instead of revealing new malware or hacking tool, the whistleblower organisation has unveiled how CIA operatives stealthy collect and forward stolen data from compromis… Continue reading How CIA Agents Covertly Steal Data From Hacked Smartphones (Without Internet)

All Android Phones Vulnerable to Extremely Dangerous Full Device Takeover Attack

Researchers have discovered a new attack, dubbed ‘Cloak and Dagger’, that works against all versions of Android, up to version 7.1.2.

Cloak and Dagger attack allows hackers to silently take full control of your device and steal private data, including… Continue reading All Android Phones Vulnerable to Extremely Dangerous Full Device Takeover Attack

Samsung Galaxy S8 iris scanner can be fooled with a printed photo

After demonstrating how easily Apple’s Touch ID can be fooled with a user fingerprint photographed from a glass surface, Chaos Computer Club (CCC) hacker “Starbug” has proven that the iris recognition system in Samsung’s Galaxy S8 smartphone can be fooled by using a printed photo of the user’s eye(s). The hack As demonstrated in the video below, the whole process is extremely simple: Take a photo of the user with a digital camera (preferably in … More Continue reading Samsung Galaxy S8 iris scanner can be fooled with a printed photo

All OnePlus Devices Vulnerable to Remote Attacks Due to 4 Unpatched Flaws

There is a bad news for all OnePlus lovers.

A security researcher has discovered four vulnerabilities that affect all OnePlus handsets, including One, X, 2, 3 and 3T, running the latest versions of OxygenOS 4.1.3 (worldwide) and below, as well as Hydr… Continue reading All OnePlus Devices Vulnerable to Remote Attacks Due to 4 Unpatched Flaws

Beware! Pre-Installed Android Malware Found On 36 High-end Smartphones

Bought a brand new Android Smartphone? Do not expect it to be a clean slate.

At least 36 high-end smartphone models belonging to popular manufacturing companies such as Samsung, LG, Xiaomi, Asus, Nexus, Oppo, and Lenovo, which are being distributed by… Continue reading Beware! Pre-Installed Android Malware Found On 36 High-end Smartphones

7 Things That Happened After WikiLeaks Dumped The CIA Hacking Files

This week WikiLeaks published “Vault 7” — a roughly 8,761 documents and files claiming to detail surveillance tools and tactics of the Central Intelligence Agency (CIA).

The leak outlined a broad range of flaws in smartphones and other devices that the agency uses to intercept communications and spy on its targets, making even China and Germany worried about the CIA’s ability to hack all

Continue reading 7 Things That Happened After WikiLeaks Dumped The CIA Hacking Files