Recently, Samsung has rolled out security updates for its mobile devices to fix some critical security vulnerabilities. Samsung has published the official...
Watch out for attacks attempting to take advantage of the lockdown-induced surge in mobile banking use
From the humble passcode to biometric authentication, there are quite a few options to lock your Android phone. But which of them...
Hot on the heels of his research into an attack that attempted to take down ESET’s website, Lukas Stefanko sheds more light...
Losing your smartphone can be expensive, but the cost of the device may not be the final price you’ll be paying
With World Backup Day upon us, we walk you through the ways to back up your iPhone or Android phone so that...
Nowadays, employees, customers, and stakeholders at all levels are adopting BYOD onboarding practices. Fortunately, it’s entirely possible for companies to restrict network...
Exclusive research found 9 critical system-level Android VoIP Zero-day vulnerabilities that allow attackers to perform malicious operations, including denying voice calls, caller...
Malware detections for iOS increased, as did the number of vulnerabilities detected in this operating system, while in the case of Android,...
Mobile phones have become a part of everyday life, and their functionality continues to develop at a rapid pace. You can switch...
Are you in the 26% of people who use one of these PIN codes to unlock their phones?
Israeli forensics firm and well-known Law enforcement contractor Cellebrite released a public statement that they can hack any iOS and High-end Android...
OnePlus 7 Pro Fingerprint Scanner hacked within minutes using Fake Fingerprint that can be created using hot-glue due to inadequate security that...
IMSI catcher is a surveillance tool that masquerades as legitimate cell-phone towers, tricking phones within a certain radius into connecting to the...
An URL bar address spoofing vulnerability with the latest versions of UC Browser and UC Browser Mini exposes millions of users to...
The brand new Nokia flagship with five camera modules looks pretty promising but has several significant weaknesses. Recently, it shocked the world...
Cybercriminals are activity performing SIM swap Attack in various countries to bypass 2 Factor Authentication and to compromise the various social media...