Trending
Heat Index
Mobile Hacking
Most Recent
 
Read More
January 26, 2018

Android Vulnerability Allows Applications to Make Unauthorized Calls without Permissions

A major vulnerability believed to be present in most versions of Android can allow a malicious Android applications on the Android app store to make phone calls on a user’s device, even when they lack the necessary permissions.

The critical vulnerability was identified and reported to Google Inc. late last year by researchers from German security firm Curesec. The researchers believe the virus was first noticed in Android version 4.1, also known as “Jelly Bean.”

APPS CAN MAKE CALLS FROM YOUR PHONE

“This bug can be abused by a malicious application. Take a simple game which is coming with this code. The game won’t ask you for extra permissions to do a phone call [...]

 
Read More
January 26, 2018

Xiaomi Phones Secretly Sending Users’ Sensitive Data to Chinese Servers

Chinese telecoms equipment suppliers have previously been criticized by some countries due to suspected backdoors in its products, and if United States has banned its several major government departments, including NASA, Justice and Commerce Departments, from purchasing Chinese products and computer technology, then they are not wrong at all.

In the latest claim against Chinese smartphone manufacturers is the allegation that the popular Chinese smartphone brand, Xiaomi has been suspected of “secretly” stealing users’ information — including SMS messages and photos —from the device without the user’s permissions and sending it back to a server in Beijing, despite of [...]
 
Read More
January 26, 2018

AirHopper — Hacking Into an Isolated Computer Using FM Radio Signals

In order to secure sensitive information such as Finance, many companies and government agencies generally use totally secure computer systems by making sure it aren’t connected to any network at all. But the most secure systems aren’t safe anymore.

Security researchers at the Cyber Security Labs at Ben Gurion University in Israel have found a way to snoop on a personal computer even with no network connection.

STEALING DATA USING RADIO SIGNALS

Researchers have developed a proof-of-concept malware that can infiltrate a closed network to lift data from a machine that has been kept completely isolated from the internet or any Wi-Fi connection by [...]
 
Read More
January 26, 2018

Espionage Campaign targets iOS devices with Malware apps

A malware campaign has been found targeting iOS devices linked to a wide range of entities, including European defense organizations, governments, and media sectors with dangerous espionage spyware capable of breaching non-jailbroken devices, a recent report claims. The spyware campaign, dubbed “Operation Pawn Storm” by security experts, was first detected on Windows computers late last year, but has now made its way to iOS devices, a report by security researchers at TrendLabs noted. The researchers linked the campaign to the Russian government.

XAGENT SPYWARE APP

One of the two spywares used in the campaign is actually an application, the firm dubbed the [...]

Religious News
 
Read More
 
Read More
 
Read More

 
Read More
Trending Topics
Africa
Ghana
Uganda
Morocco
Kenya
Nigeria
Global News
Religious
Ghana
Ghana Today
 
 
 
 
Right Now
 
 
 
 
 
Top Five
Heat Index
 
1
The Last Slave Ship Survivor Gave an Interview in the 1930s. It Just Surfaced
 
2
Fortnite Week 5 Challenges: Greasy Grove Treasure Map, Minigun/LMG Bug, Disco Ball Dance
 
3
First-Ever Ransomware Found Using ‘Process Doppelgänging’ Attack to Evade Detection
 
4
Illicit arms movement caused deadly Moyale violence: Ethiopia govt
 
5
Kenya power company sued for over-billing consumers
Compare
Go