The Latest in IT Security

Posts Tagged ‘sim card’

While only a certain brand of smartphones was vulnerable to being wiped via an USSD command embedded in webpages, the locking of SIM cards is possible with most any Android phone. The victim just needs to have the phone access a maliciously-formed “tel:” URI, such as by visiting a web page with an embedded iframe. […]

Read more ...

There is no secret that cybercriminals try to intimidate users very often in order to infect their machines. We’ve seen a lot of examples of cybercriminals using black SEO for redirecting users to web pages which emulate AV scanning. And there is no surprise that the results of such ‘scanning’ show that the user’s machine […]

Read more ...

Earlier yesterday, a few SMS Trojans were found in Android Market and subsequently removed from the market place. In this blog post, we will be demonstrating some of the interesting behaviours uncovered through dynamic analysis. What does it do? The objective of this Trojan is to send SMS to premium numbers. The destination number is […]

Read more ...


Categories

SUNDAY, MAY 19, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments