Tens of thousands of Android devices have exposed debug port 5555 wide open to the internet.
Security researchers from Symantec have disclosed a new iOS vulnerability dubbed ‘Trustjacking’ that allows an attacker to exploit an iTunes Wi-Fi Sync feature and take control of a victim’s device.
Google announced on Wednesday the first developer preview of Android P, the newest version of Android.
Apple is rushing to fix a another ‘Text Bomb’ bug that crashes a number of iOS and Mac apps.
Trend Micro researchers detected a new variant of Android Remote Access Tool (AndroRAT) that targets an older publicly disclosed vulnerability (CVE-2015-1805) that allows an attacker to compromise older Android devices to perform privilege escalation.
Someone has posted to GitHub the purported source code for a critical component for iPhone’s bootloader or “iBoot.” Access to iBoot code could allow hackers to find vulnerabilities in iOS that could be exploited in the future. iBoot is responsible for ensuring the trusted boot of the mobile operating system, in a sense like iPhone’s BIOS.
Fitness app and social media company Strava has introduced a Global Heatmap service, that may have allowed many service people to inadvertently expose the locations of their military bases.
The PCI Security Standards Council (PCI SSC) announced a new PCI Security Standard for software-based PIN entry on commercial off-the-shelf devices (COTS), to include smartphones and tablets.
Vulnerabilities dubbed “Trackmageddon” were discovered in online services of (GPS) location tracking devices. The vulnerabilities could allow third parties unauthorized access to location data of all location tracking devices managed by a vulnerable online service. Other types of data impacted include, serial number (i.e., IMEI), assigned phone number, model/type name and custom assigned names. The latter two …
A serious Android security vulnerability dubbed Janus could allow attackers to modify the code in applications without affecting their signatures. Attackers could then use the technique to gain indirect access to the device.