The Latest in IT Security

1

Researchers say several Motorola handset models are vulnerable to a critical kernel command line injection flaw that could allow a local malicious application to execute arbitrary code on the devices. The two affected Motorola models are the Moto G4 and Moto G5. The warnings come from Aleph Research which said it found the vulnerability on up-to-date handsets running the latest Motorola Android bootloader.

Read more ...

1

Google removed a nasty Trojan from Google Play earlier this week that could have rooted Android devices and injected malicious code into an infected device’s system library. The malware, dubbed Dvmap, was disguised as a game that had been downloaded more than 50,000 times prior to its removal, according to Roman Unuchek, a senior malware analyst with Kaspersky Lab who uncovered the Trojan.

Read more ...

1

Despite the benefits experienced from unplugging, most individuals still prefer to stay connected when on vacation. But when individuals put convenience over security, by using unsecured Wi-Fi access points that are easily hackable for example, they leave themselves open to the possibility of having their personal information compromised.

Read more ...

1

University researchers are warning that two features, not flaws, core to Google’s Android mobile operating system can be used together to launch clickjacking attacks to gain control of a target’s phone. The discovery was made by researchers at Georgia Institute of Technology, who call the research Cloak and Dagger.

Read more ...

Categories

TUESDAY, JUNE 27, 2017

Featured

Archives

Latest Comments

Social Networks