Scientists have come up with a new way to convert radio waves into electricity.
An international team of researchers from Tohoku University, the National University of Singapore, and the University of Messina in Italy has developed an innovative method for converting electromagnetic wave energy...
Android users voluntarily give their data to the new Trojan.
Intel 471 specialists have identified a new banking Trojan called BlankBot, targeting Android users in Turkey. The program is designed to steal financial information and has a wide range of malicious features.
BlankBot is capable of...
The neural network was taught to recognize the user’s PIN code using data from the accelerometer, light sensor and other smartphone sensors with an accuracy of 84 percent. The developers note that applications do not need to ask for user permission to access these sensors, according to the...
Scientists have calculated all the risks of technology.
Just a couple of decades ago, paying with a credit card in stores was exotic. Cash was so familiar, reliable and seemingly unshakable... But just a decade and a half brought not only credit cards into our lives, but also wireless payment...
Mastercard was the first in Russia to provide cardholders with the opportunity to use Apple Pay and Samsung Pay. The payment system was the first to launch its tokenization platform in this market - Mastercard Digital Enablement Service (MDES) turns a device connected to the Internet into a...
A security researcher has discovered a number of bugs that allow ATMs and a wide range of point-of-sale terminals to be hacked in a new way - by waving the phone over a contactless bank card reader. To mark the start of the Ethical Hacker course , we are sharing a translation of an article about...
The NSA has issued guidelines for the safe use of mobile devices.
The US National Security Agency (NSA) recommends that iPhone and Android users regularly reboot their devices to protect against attacks such as zero clicks. This simple tip can help you protect yourself from hackers who can...
Hello, Carders! The guys and I thought and decided that since everyone is starting to actively use various types of Pay (Apple Pay, Samsung Pay, Android Pay, and a couple more from vendors are just around the corner), then why not give users the opportunity not only to pay using a smartphone at...
Google has announced features that will make the system even more invulnerable.
Google has announced an impressive set of new security features for its Android mobile operating system. Among them is an innovative smartphone theft detection technology that can recognize the moment when the...
Android security does not lose its relevance, since smartphones running on this operating system are extremely widespread in Russia. However, many users do not take any measures and believe that the built-in protection is sufficient.
This article will analyze the main information security risks...
Most of the functionality in various areas somehow "moves" to smartphones. The trend was not spared by the Kali Linux distribution, which is well-known among security specialists, with the help of which IT systems are checked for vulnerability. The OS contains programs for conducting tests in...
Researchers call the identified vulnerability one of the most dangerous in the smart home industry.
A serious security threat was detected in smart locks managed by Chirp Systems software. Thanks to a critical vulnerability, attackers can remotely unlock them and physically enter protected...
Thousands of devices in the service of scammers: an underground industry of illegal software trading is flourishing in China.
A shadowy industry has flourished in China, manufacturing and selling smartphone motherboards, as well as software to manage thousands of such devices simultaneously. As...
The vulnerability affects more than 1 million Tesla Model 3 vehicles worldwide"
Security researchers Talal Haj Bakri and Tommy Misk have demonstrated how they can conduct a phishing attack to compromise a Tesla owner's account, unlock the car, and start the engine. It is noted that the attack...
An interesting experiment reveals which companies are most interested in your data.
In today's world, where smartphones have become an integral part of our lives, privacy and data security issues are coming to the fore. A recent experiment showed that phones can transfer gigabytes of data to...
So how do advertisers know what we need?
Many people have noticed that after discussing a product out loud (for example, with friends in the company), its advertising appears on the Internet. And then the question arises-does the smartphone really listen to us and transmit data to advertisers...
The developers said that frequent Android reboots block the possibility of exploiting vulnerabilities.
The GrapheneOS development team, which created the eponymous Android operating system focused on privacy and security, proposed introducing an automatic reboot function in Android, which will...
Your movements are very easy to follow, even if you don't want to.
A new study by Citizen Lab has shown that outdated technologies that enable mobile phone roaming also allow you to track the location of phone owners on a global level.
The main vulnerability of the system is its flexibility...
Millions of lovers of numeric passwords are at risk.
Researchers from China and Singapore have discovered a new method of attacking smartphones connected to modern Wi-Fi routers. The attack, dubbed "WiKI-Eve", allows you to intercept open text transmissions and determine numeric keys with up to...
The covert use of hacking technology raises questions about fairness and transparency.
Cellebrite, a company known for its smartphone hacking technology, is calling on government agencies and security services to keep the use of its products secret. This is reported by TechCrunch.
The company...