Thousands of Android devices leave debug port 5555 exposed
Tens of thousands of Android devices have exposed debug port 5555 wide open to the internet.
Thousands of Android devices leave debug port 5555 exposed Read More »
Tens of thousands of Android devices have exposed debug port 5555 wide open to the internet.
Thousands of Android devices leave debug port 5555 exposed Read More »
Security researchers from Symantec have disclosed a new iOS vulnerability dubbed ‘Trustjacking’ that allows an attacker to exploit an iTunes Wi-Fi Sync feature and take control of a victim’s device.
“Trustjacking” iOS vulnerability Read More »
Google announced on Wednesday the first developer preview of Android P, the newest version of Android.
An Android P preview Read More »
Apple is rushing to fix a another ‘Text Bomb’ bug that crashes a number of iOS and Mac apps.
Apple’s ‘Text Bomb’ bug Read More »
Trend Micro researchers detected a new variant of Android Remote Access Tool (AndroRAT) that targets an older publicly disclosed vulnerability (CVE-2015-1805) that allows an attacker to compromise older Android devices to perform privilege escalation.
AndroRAT exploits older Android vulnerability Read More »
Someone has posted to GitHub the purported source code for a critical component for iPhone’s bootloader or “iBoot.” Access to iBoot code could allow hackers to find vulnerabilities in iOS that could be exploited in the future. iBoot is responsible for ensuring the trusted boot of the mobile operating system, in a sense like iPhone’s BIOS.
Apple’s iPhone ‘iBoot’ source code leak Read More »
Fitness app and social media company Strava has introduced a Global Heatmap service, that may have allowed many service people to inadvertently expose the locations of their military bases.
Fitness app users could expose military bases Read More »
The PCI Security Standards Council (PCI SSC) announced a new PCI Security Standard for software-based PIN entry on commercial off-the-shelf devices (COTS), to include smartphones and tablets.
PCI security standards for mobile point of sale Read More »
Vulnerabilities dubbed “Trackmageddon” were discovered in online services of (GPS) location tracking devices. The vulnerabilities could allow third parties unauthorized access to location data of all location tracking devices managed by a vulnerable online service. Other types of data impacted include, serial number (i.e., IMEI), assigned phone number, model/type name and custom assigned names. The latter two
Trackmageddon exposes millions of GPS tracking devices Read More »
A serious Android security vulnerability dubbed Janus could allow attackers to modify the code in applications without affecting their signatures. Attackers could then use the technique to gain indirect access to the device.
Janus Android vulnerability Read More »