The Latest in IT Security

Posts Tagged ‘mobile devices’

In late May we reported on the details of Backdoor.AndroidOS.Obad.a, the most sophisticated mobile Trojan to date. At the time we had almost no information about how this piece of malware gets onto mobile devices. We have since been examining how the Trojan is distributed and discovered that the malware owners have developed a technique […]

Read more ...

Indian #researcher #arul Kumar discovered a flaw on #facebook that would have allowed hackers to delete any posted photo they wanted on the site. Through the site’s White Hat program, Kumar has been paid $12,500 for his efforts. The bug worked by exploiting Facebook’s Support #dashboard, and functioned on any browser and with any version […]

Read more ...

Russian anti-virus company Doctor Web has prepared an overview of dangerous spyware applications designed to run under iOS, considered to be the most secure mobile platform. Like similar programs for other OSs, such applications allow attackers to obtain a wide range of personal information: SMS messages, call logs, GPS coordinates, address book records, photographs, etc. […]

Read more ...


Categories

MONDAY, MARCH 17, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments