Quantcast
Channel: CyberInsecure.com » Mobile
Browsing all 20 articles
Browse latest View live

GSM Encryption Cracked, 4.3 Billion Mobile Phones Affected

The unveiling of a GSM (Global System for Mobile Communications) encryption codebook compiled by a German security researcher and his team of collaborators lowers the bar significantly for the amount...

View Article



Rogue Phishing App Spread Through Android Marketplace

A phisher hoping to harvest bank login details managed to smuggle his app onto the Android app store. The Android Market, launched in October 2008, offers more than 20,000 mobile applications for...

View Article

Trojan Porn Dialers Make Comeback On Mobile Phones

After taking a long hiatus, trojan dialers that can rack up thousands of dollars in charges are back by popular demand. According to researchers at CA Security’s malware analysis lab, a new wave of...

View Article

iPhone Vulnerable To Remote Attack On SSL

Apple’s iPhone is vulnerable to exploits that allow an attacker to spoof web pages even when they’re protected by the SSL, or secure sockets layer, protocol, a security researcher said. The fault lies...

View Article

Encryption Used To Prevent Eavesdropping Cracked, More Than 800 Million...

Cryptographers have broken the proprietary encryption used to prevent eavesdropping on more than 800 million cordless phones worldwide, demonstrating once again the risks of relying on obscure...

View Article


Blackberry Spyware Source Code, TXSBBspy, Released By Veracode

Veracode today released Blackberry-specific spyware, which the code-review specialist intends as a “call for defensive research” to show that the BlackBerry is vulnerable to spyware problems. “The...

View Article

Rootkit-based Exploits Could Eavesdrop Smartphones

Computer scientists at Rutgers University this week are demonstrating ways that rootkits can attack new generations of smart mobile phones. The researchers, who are presenting their findings at a...

View Article

Vodafone Shipped Malware Infected HTC Magic Smartphones

Vodafone has been blamed for shipping Mariposa botnet malware and other nasties on a HTC Magic Android smartphones it supplied. The mobile phone giant’s Spanish arm supplied an HTC Magic smartphone...

View Article


Windows Mobile Trojan Poses As “3D Anti-terrorist action” War Game

Miscreants have created a Trojaned version of a Windows mobile game that makes expensive international phone calls from compromised smartphones. Pirated versions of 3D Anti-terrorist action, a...

View Article


Fake iPhone Unlocking App Changes DNS And Hijacks Internet Connection

An application that offers to unlock iPhones is actually designed to hijack internet connections on compromised Windows PCs, security watchers warn. Spam messages direct potential victims to a domain...

View Article

Email Addresses Of More Than 114,000 iPad Owners Exposed By AT&T

AT&T has exposed the email addresses of more than 114,000 early adopters of Apple’s iPad, a security breach that could make some of the world’s most elite celebrities and executives vulnerable to...

View Article

Mobile Malware Create A 100,000 Botnet On Symbian Series 60 Handsets

Mobile malware that affects Symbian Series 60 handsets is being used to create a botnet. Security firm NetQin claims as many as 100,000 smartphones have been compromised with the malware, which...

View Article

Inexpensive Equipment Tricks GSM Mobile Phones And Intercepts Calls

Chris Paget, a security researcher known for his work in the field of radio communications security, demonstrated how GSM phone calls can be intercepted with inexpensive equipment at the DEFCON hackers...

View Article


Adobe’s Technology Allows iPad Users To Read Subscription-Only Publications...

Bugs in iPad applications used by numerous newspapers and magazines to deliver digital content to their paying subscribers, can be exploited to access it for free. The problems were discovered by a...

View Article

Windows Phone Marketplace Protection, PlayStation3 Code Signing Cracked

A whitehat hacker has cracked the digital rights management system enforced by Microsoft on Windows Phone 7 and demonstrated a simple method which allows users to install any application from the...

View Article


Locked iPhone Allows Passwords Theft And Decryption

German security researchers have demonstrated that passwords stored on a stolen or lost iPhone can be retrieved in around six minutes even if the device is locked. Researchers Jens Heider and Matthias...

View Article

Android Market Security Update Released By Google Contained Mobile Trojan

Chinese hackers are distributing a mobile trojan to users as a repackaged version of the Android Market security update released by Google last week. Repackaging legit Android apps with trojans is...

View Article


Apple Releases iOS 4.3 Security Update, Incompatible iPhone 3G Users Remain...

Apple is leaving some of its older mobile devices unprotected with its latest patch batch. An iOS 4.3 update, which includes a number of critical security fixes, is incompatible with the still widely...

View Article

Facebook Mobile API XSS Vulnerability Used To Launch Spam Worm

A Facebook cross-site scripting (XSS) vulnerability was used to launch a self-propagating spam worm on the social network, according to security researchers from Symantec. The XSS vulnerability was...

View Article

Web Sessions Over Protected Wireless Networks Can Be Hijacked With An Android...

A new Android app makes hijacking other people’s Facebook, Twitter, YouTube and Amazon sessions a breeze over private or open wireless networks. Called FaceNiff, the app is the work of a Polish...

View Article
Browsing all 20 articles
Browse latest View live




Latest Images