Traditional detection methods have become ineffective against new threats.
According to a recent report by Zimperium, 82% of all phishing sites on the Internet are now targeting mobile devices. Moreover, 76% of these sites use the HTTPS protocol, which misleads users by creating a false...
The Houthis, it turns out, can not only go to war, but also navigate cyberspace quite well.
Lookout researchers have uncovered an ongoing spyware operation called GuardZoo targeting military personnel across the Middle East.
According to recerchers, the campaign, which allegedly began in...
A cybersecurity researcher has discovered a number of bugs that allow ATMs and POS terminals to be hacked. Experts and criminals have previously demonstrated attacks on ATMs, but this time we were shown a truly new method - using a smartphone and a contactless card reader.
Joseph Rodriguez, a...
Update quickly before hackers pave a cyberpath to your gadget.
Following Microsoft's now-familiar Patch Tuesday, Google also released updates to address 50 security vulnerabilities in its Pixel devices and warned that one of them, tracked as CVE-2024-32896, is an escalation of privilege (EoP)...
Many smartphone users are familiar with the concept of “linking to an account.” Various smartphone vendors have their own mechanisms to protect smartphones from theft: Apple has FMI, Xiaomi has Mi Cloud, and Google has FRP. However, Android has a long-standing vulnerability that allows it to...
Sec-Tec, a company specializing in information security, has found that inexpensive thermal imagers for smartphones can help fraudsters steal a bank card PIN code from an ATM pin pad. Thermal imager modules can be bought for several hundred dollars: for example, FLIR One for iPhone will cost...
Companies respond to vulnerabilities after specialist intervention.
Cybersecurity company Oversecured has discovered problems in Android applications from Xiaomi and the Google Android Open Source Project (AOSP) affecting users around the world.
The study identified 20 vulnerabilities related...
Smartphones have firmly entered our lives, opening up the widest opportunities for communication, work and entertainment. However, many people do not even think about the fact that your favorite gadget can be a real spy and follow its owner. In this article, we will tell you how smartphones spy...
The Air Force fears for national security due to Apple's strict policy.
The South Korean armed forces plan to introduce a complete ban on the use of iPhones in military institutions. The main reason for such measures is the risk of leakage of confidential information through voice recordings...
Contacts, messages, passwords – nothing is hidden from an advanced malware.
A group of cybersecurity experts has discovered the resumption of a cyber espionage campaign targeting users in South Asia. The purpose of the attacks is to introduce a new version of the LightSpy malware aimed at iOS...
The corporation warned users about hacking devices.
On April 10, Apple sent warnings to iPhone users in 92 countries about the possible threat of spyware infection.
The message states: "Apple has discovered that your iPhone, which is associated with your Apple ID, was the target of a spy...
The malicious library makes the user an accomplice in online fraud.
28 free VPN apps on Google Play used a malicious SDK, turning Android devices into resident proxies, probably used for cybercrime and bots.
The HUMAN found that malicious apps used the LumiApps SDK, which contained the...
New research raises questions about the impact of technology on reproductive health.
In a new study conducted by the University of Geneva in collaboration with the Swiss Tropical and Public Health Institute, a link was found between frequent mobile phone use and a decrease in sperm count in...
At least eight well-known opposition figures were among the victims.
In India, several opposition politicians reported attempts to hack their Apple smartphones. This is reported by TASS .
According to the report, Shashi Tharoor, a representative of the Indian National Congress, was among the...
PaySpace Magazine has compiled a selection of the most technologically advanced smartphones of our time, supporting blockchain technology, biometrics and crypto wallets, advanced cameras and screens of unusual design
From biometrics to mPOS terminals: The most technologically advanced...