Home Search

Android - search results

If you're not happy with the results, please do another search
Sardonic, BitMart

Hackers Steal Cryptocurrency Worth $150 Mn From BitMart Exchange

0
The evolution of cryptocurrencies has attracted cybercriminal groups globally.  Cryptocurrency exchanges and hot wallets continue to become a primary target for threat actors.  The...
Omicron_News

NHS U.K. Warns About Fake Omicron PCR Test Alerts

0
Just when the world is trying to come to terms with the challenges unleashed by the COVID-19 virus, we have another variant, Omicron.  Threat...
WhisperGate malware campaign, FluBot malware

Finland Warns About ‘Flubot’ Malware Spread Via SMS

0
FluBot – an infamous banking malware that affected thousands of users across Australia and the U.K. – is now active in Finland. In an official...
Smishing attacks

Threat Actors Leverage Smishing to Target Iran Citizens

0
Security researchers from Check Point found ongoing malware campaigns targeting Iran citizens. The campaign reportedly uses socially engineered SMS messages to infect tens of...
MediaTek, Intel Processor Vulnerability, chip

Vulnerabilities in MediaTek Chips Found in 37% of Smartphones Worldwide

0
Security experts from Check Point discovered multiple security flaws in smartphone chips developed by MediaTek, which could have led attackers to spy on Android...
Apple sues NSO Group

Apple Files Lawsuit Against NSO Group for State-sponsored Surveillance

0
Israel’s cyber intelligence and surveillance company NSO Group is once again in a legal row. On November 23, 2021, Apple stated that the company has...
Microsoft September 2021 Patch Tuesday

Microsoft September 2021 Patch Tuesday: Mitigations and Workarounds

0
Microsoft released fixes for 60 security vulnerabilities in its latest September 2021 Patch Tuesday update. Out of 60 vulnerabilities, 56 were determined as important,...
Healthcare IoT, Fitness Trackers

61 Mn Fitness Tracking Records Leaked via Unsecured GetHealth Database

0
The rise of IoT devices in the health care sector led to various potential cyber risks. The usage of wearable devices like fitness bands...
SSID Stripping

Hackers Use SSID Stripping to Trick Users Into Joining Rogue APs

0
With the evolution of new threat actors and their latest attack vectors, the cyberthreat landscape is larger than expected.  Security experts from AirEye recently...
Man-in-the-Middle Attack

What is Man-in-the-Middle Attack and How to Prevent them

0
Man-in-the-middle (MITM) attacks are gaining importance in the cyberattack landscape as threat actor groups are leveraging it more often to harvest users’ sensitive data...

MOST POPULAR

RECENT POSTS

Cybersec Europe

HackVSIT 6.0

CyberX Bahrain

Infosecurity Europe