Archive for the ‘mobile hacking’ Category

Insecure UC Browser ‘Feature’ Lets Hackers Hijack Android Phones Remotely

March 26th, 2019
Beware! If you are using UC Browser on your smartphones, you should consider uninstalling it immediately. Why? Because the China-made UC Browser contains a "questionable" ability that could be exploited by remote attackers to automatically download and execute code on your Android devices. Developed by Alibaba-owned UCWeb, UC Browser is one of the most popular mobile browsers, specifically

Posted in hack android mobile, hacking news, how to hack android, malware, man-in-the-middle attack, mobile browser, mobile hacking, Mobile Security, UC Browser, UC Web Browser | Comments (0)

New Android Malware Apps Use Motion Sensor to Evade Detection

January 18th, 2019
Even after so many efforts by Google for preventing its Play Store from malware, shady apps somehow managed to fool its anti-malware protections and get into its service to infect Android users with malware. Two such Android apps have recently been spotted on the Google Play Store by security researchers with the Trend Micro malware research team, infecting thousands of Android users who have

Posted in Android, Android Malware, cyber security, google apps, Google Play Protect., Google Play Store, hacking news, mobile hacking, mobile virus | Comments (0)

Android Trojan Now Targets Non-Banking Apps that Require Card Payments

August 18th, 2017

The infamous mobile banking trojan that recently added ransomware features to steal sensitive data and lock user files at the same time has now been modified to steal credentials from Uber and other booking apps as well.

Security researchers at Kaspersky Lab have discovered a new variant of the Android banking Trojan called Faketoken that now has capabilities to detect and record an infected

Posted in Android Banking Malware, Android Malware, credit card hacking, mobile banking trojan, mobile hacking, Secure Payment Cards | Comments (0)

Dangerous Mobile Banking Trojan Gets ‘Keylogger’ to Steal Everything

August 1st, 2017

Cyber criminals are becoming more adept, innovative, and stealthy with each passing day. They have now shifted from traditional to more clandestine techniques that come with limitless attack vectors and are harder to detect.

Security researchers have discovered that one of the most dangerous Android banking Trojan families has now been modified to add a keylogger to its recent strain, giving

Posted in Android Banking Malware, android banking trojan, Android Malware, how to hack android, keylogger, keylogger tool, mobile hacking | Comments (0)

More Firmware Backdoor Found In Cheap Android Phones

December 13th, 2016

Here’s some bad news for Android users again.

Certain low-cost Android smartphones and tablets are shipped with malicious firmware, which covertly gathers data about the infected devices, displays advertisements on top of running applications and downloads unwanted APK files on the victim’s devices.

Security researchers from Russian antivirus vendor Dr.Web have discovered two types of

Posted in Android hacking, Android Malware, Android Trojan, hacking news, malicious advertisement, malicious firmware, mobile backdoor, mobile hacking, Trojan backdoors | Comments (0)

Hacking Firmware from Mobile Phone Hacking Company Leaked Online

October 26th, 2016

The Israeli firm Cellebrite, which provides digital forensics tools and software to help law enforcement access mobile phones in investigations, has had its firmware and software leaked online.

Yes, you heard that right. Cellebrite’s most sensitive in-house capabilities have been made public by one of its products’ resellers, who is now distributing copies of Cellebrite’s firmware and

Posted in Cellebrite, Cellphone hacking, download hacking tools, hacking news, hacking tools, iOS forensics tool, iPhone Hacking Tool, mobile forensics, mobile hacking | Comments (0)

Mobile Applications Leak Device, Location Data

October 20th, 2016

A study finds risky apps leave mobile devices open to SMS denial-of-service attack and remote SIM card rooting.

Posted in Android vulnerabilities, BYOD, IMEI, iOS vulnerabilities, mobile hacking, Mobile Security, SIM card rooting, SMS denial-of-service attack, vulnerabilities | Comments (0)

Stagefright Bug 2.0 — One Billion Android SmartPhones Vulnerable to Hacking

October 1st, 2015

Attention Android users!

More than 1 Billion Android devices are vulnerable to hackers once again – Thanks to newly disclosed two new Android Stagefright vulnerabilities.

Yes, Android Stagefright bug is Back…

…and this time, the flaw allows an attacker to hack Android smartphones just by tricking users into visiting a website that contains a malicious multimedia file, either MP3 or

Posted in Android Vulnerability, hacking android phone, how to hack android, mobile hacking, Stagefright, Stagefright Bug, Stagefright vulnerability, Vulnerability | Comments (0)

Samsung Flaw Lets Hacker Easily Take Control of Your Galaxy Mobile Remotely

June 19th, 2015

More than 600 Million users of Samsung Galaxy smartphones, including the newly released Galaxy S6, are potentially vulnerable to a software bug that allows hackers to secretly monitor the phone’s camera and microphone, read text messages and install malicious apps.

The vulnerability is due to a problem with the Samsung built-in keyboard app that enables easier predictive text.

One of

Posted in hacking samsung mobile, hacking smartphone, Keyboard, mobile hacking, Mobile Security, samsung galaxy, samsung mobile, SwiftKey, Vulnerability | Comments (0)