The Latest in IT Security

1

After a recent investigation, Mexican NGOs allege that the Mexican government is deploying sophisticated mobile spying software on local journalists, lawyers and activists. Using fake custom messages, such as news, pictures and text messages to lure victims into clicking various URLs, a series of zero-day vulnerabilities would be exploited to allow remote control of the targeted devices.

Read more ...

1

Research paper: “Subscribers remote geolocation and tracking using 4G VoLTE enabled Android phone,” by Patrick Ventuzelo, Olivier Le Moal, and Thomas Coudray. Abstract: VoLTE (Voice over LTE) is a technology implemented by many operators over the world. Unlike previous 2G/3G technologies, VoLTE offers the possibility to use the end-to-end IP networks to handle voice communications.

Read more ...

1

Just how much money can a scammy iPhone app make in the iOS App Store? You may be surprised. After all, how does $80,000 per month sound to you? The “Mobile protection :Clean & Security VPN” app is estimated to be have earnt its developer $80,000 per month, after tricking users into signing up for an eye-watering $99.99 per week subscription through a careless thumb press.

Read more ...

1

Researchers say several Motorola handset models are vulnerable to a critical kernel command line injection flaw that could allow a local malicious application to execute arbitrary code on the devices. The two affected Motorola models are the Moto G4 and Moto G5. The warnings come from Aleph Research which said it found the vulnerability on up-to-date handsets running the latest Motorola Android bootloader.

Read more ...

Categories

MONDAY, JUNE 26, 2017

Featured

Archives

Latest Comments

Social Networks