smartphone

  1. Tomcat

    The neural network spied the smartphone PIN code in the accelerometer data

    The neural network was taught to recognize the user’s PIN code using data from the accelerometer, light sensor and other smartphone sensors with an accuracy of 84 percent. The developers note that applications do not need to ask for user permission to access these sensors, according to the...
  2. Tomcat

    How carders can and cannot hack NFC payment in your smartphone

    Scientists have calculated all the risks of technology. Just a couple of decades ago, paying with a credit card in stores was exotic. Cash was so familiar, reliable and seemingly unshakable... But just a decade and a half brought not only credit cards into our lives, but also wireless payment...
  3. Tomcat

    How did the smartphone become a payment device? About the Mastercard tokenization platform.

    Mastercard was the first in Russia to provide cardholders with the opportunity to use Apple Pay and Samsung Pay. The payment system was the first to launch its tokenization platform in this market - Mastercard Digital Enablement Service (MDES) turns a device connected to the Internet into a...
  4. Tomcat

    NFC vulnerabilities allow ATM to be hacked by simply waving your smartphone

    A security researcher has discovered a number of bugs that allow ATMs and a wide range of point-of-sale terminals to be hacked in a new way - by waving the phone over a contactless bank card reader. To mark the start of the Ethical Hacker course , we are sharing a translation of an article about...
  5. Tomcat

    NSA reveals a simple way to protect your smartphone from hackers

    The NSA has issued guidelines for the safe use of mobile devices. The US National Security Agency (NSA) recommends that iPhone and Android users regularly reboot their devices to protect against attacks such as zero clicks. This simple tip can help you protect yourself from hackers who can...
  6. Tomcat

    We withdraw and deposit cash at an ATM using a smartphone. For the first time in the world.

    Hello, Carders! The guys and I thought and decided that since everyone is starting to actively use various types of Pay (Apple Pay, Samsung Pay, Android Pay, and a couple more from vendors are just around the corner), then why not give users the opportunity not only to pay using a smartphone at...
  7. Father

    A new era of Android security: now your smartphone knows how to protect itself

    Google has announced features that will make the system even more invulnerable. Google has announced an impressive set of new security features for its Android mobile operating system. Among them is an innovative smartphone theft detection technology that can recognize the moment when the...
  8. Father

    Android Smartphone Security — What you need to know

    Android security does not lose its relevance, since smartphones running on this operating system are extremely widespread in Russia. However, many users do not take any measures and believe that the built-in protection is sufficient. This article will analyze the main information security risks...
  9. Father

    Kali Linux for your smartphone

    Most of the functionality in various areas somehow "moves" to smartphones. The trend was not spared by the Kali Linux distribution, which is well-known among security specialists, with the help of which IT systems are checked for vulnerability. The OS contains programs for conducting tests in...
  10. Father

    Smartphone instead of a lock pick: Chirp smart locks undermine the security of tens of thousands of households

    Researchers call the identified vulnerability one of the most dangerous in the smart home industry. A serious security threat was detected in smart locks managed by Chirp Systems software. Thanks to a critical vulnerability, attackers can remotely unlock them and physically enter protected...
  11. Teacher

    Smartphone farms: who grows fake likes in cybercrime fields

    Thousands of devices in the service of scammers: an underground industry of illegal software trading is flourishing in China. A shadowy industry has flourished in China, manufacturing and selling smartphone motherboards, as well as software to manage thousands of such devices simultaneously. As...
  12. Teacher

    Tesla Model 3: a new method of theft-through your smartphone

    The vulnerability affects more than 1 million Tesla Model 3 vehicles worldwide" Security researchers Talal Haj Bakri and Tommy Misk have demonstrated how they can conduct a phishing attack to compromise a Tesla owner's account, unlock the car, and start the engine. It is noted that the attack...
  13. Teacher

    What happens if you install 100 apps on your smartphone and don't use it for three days?

    An interesting experiment reveals which companies are most interested in your data. In today's world, where smartphones have become an integral part of our lives, privacy and data security issues are coming to the fore. A recent experiment showed that phones can transfer gigabytes of data to...
  14. Teacher

    Is your smartphone listening? Most likely, you overestimate its capabilities.

    So how do advertisers know what we need? Many people have noticed that after discussing a product out loud (for example, with friends in the company), its advertising appears on the Internet. And then the question arises-does the smartphone really listen to us and transmit data to advertisers...
  15. Brother

    GrapheneOS team offers to fight hacking by rebooting your smartphone

    The developers said that frequent Android reboots block the possibility of exploiting vulnerabilities. The GrapheneOS development team, which created the eponymous Android operating system focused on privacy and security, proposed introducing an automatic reboot function in Android, which will...
  16. Carding 4 Carders

    Your smartphone sells you: How does roaming reveal a subscriber's location?

    Your movements are very easy to follow, even if you don't want to. A new study by Citizen Lab has shown that outdated technologies that enable mobile phone roaming also allow you to track the location of phone owners on a global level. The main vulnerability of the system is its flexibility...
  17. Carding

    WiKI-Eve Attack: 90% chance of finding out what you typed on your smartphone

    Millions of lovers of numeric passwords are at risk. Researchers from China and Singapore have discovered a new method of attacking smartphones connected to modern Wi-Fi routers. The attack, dubbed "WiKI-Eve", allows you to intercept open text transmissions and determine numeric keys with up to...
  18. Carding

    Secret War for Data: How Cellebrite Balances Power and Responsibility in the World of Smartphone Hacking

    The covert use of hacking technology raises questions about fairness and transparency. Cellebrite, a company known for its smartphone hacking technology, is calling on government agencies and security services to keep the use of its products secret. This is reported by TechCrunch. The company...
  19. Lord777

    Carding with your smartphone or emulator

    Why is it important to enter data from mobile devices? For the simple reason that classic carding is already slowly becoming obsolete. There is more and more mobile traffic in stores, more and more fraud in purchases from PCs, and less and less, respectively, the ratio of fraud in purchases...
  20. CreedX

    Changing geolocation on your smartphone

    iMyPhone AnyTo is an application for Android, with the help of which you can easily change your geolocation, and "walk" around the world in a couple of clicks. Also, this program has a function "simulation movement", setting it, you will be able to move at the given coordinates with the...
Top