Browsing category

Mobile Security

A Mobile Ransomware Called “LeakerLocker” Found in Google Play Store Which Leaks Phone’s Sensitive Information and Demand to Pay

Mobile Ransomware called LeakerLocker Found in Google Playstore which infect the Android Mobile user and steals the information such as contact Phone numbers, Phone call History, personal images and Email texts etc. This Ransomware will be Encrypt the file instead of that, this malware Demand a payment to prevent the attacker from spreading a victim’s […]

Samsung Galaxy iris recognition can be Hacked simply with Owner’s Photo

Security specialists from Chaos Computer Clubs found basic strides to break iris recognition system scanner of the new Samsung Galaxy S8. Samsung Galaxy S8 system guarantees secure individual client verification by utilizing the unique pattern of the human iris. But from the test directed by CCC demonstrates that this guarantee can’t be kept. To note […]

WhatsApp scam – Advertising Netflix Subscription free for a year

[jpshare]These days it winds up plainly normal as we see a huge increase with Scam message in Whatsapp, here is another WhatsApp scam – Advertising Netflix Subscription free for a year. For this new Whatsapp trick, fraudsters are utilizing this outstanding TV mark as the trap to spread the attack. Initial Scam Message If you […]

New Dangerous Android Permission Security Flaw leads to Ransomware and Banking Malware Attacks

[jpshare]A new Android vulnerability discovered in Android’s security Mechanism which leads to several android permission based attacks during run-time including ransomware, banking malware and adware. According to the Google Policy  gives extensive permissions to apps installed directly from Google Play,this flow  consists of several groups of permissions, with permissions considered as “dangerous” granted only during run-time […]

Android Ransomware(King online) Locks Phone and Asks Ransom to unlock Phone

Now it time for Android devices, Android Ransomware(King online) Locks Phone and Asks Ransom to unlock Phone. The fascinating turn on this ransomware variation is that it influences the Google Cloud Messaging (GCM) Platform, a push warning administration for sending messages to enrolled customers, as a component of its C2 infrastructre. It additionally utilizes AES encryption […]

Critical Update – Whatsapp malware targets Indian Android Users -Attacking vectors PDF, DOC, XLS

Whatsapp malware targets Indian Android Users, a warning issued by Central security services. This malware spreads through true looking word records sent by means of WhatsApp, which could then take delicate data from clients, including internet banking credentials and other Sensitive data. Identified malicious WhatsApp messages Hackers are taking advantage of two major associations in the district […]

Critical Bug:Single MMS Can Crash Message application On IOS

A solitary instant message could be abused to impair the Messages application on any iPhone because of an as of late found bug. The bug defect makes the Apple Message application inoperable, making it difficult to pursue instant messages or iMessages. The defect is not kidding, the application will keep on crashing inspite of when […]

Comodo Threat Research Labs discovered new sophisticated malware “Tordow v2.0” easily gain your mobile root privilege

Android malware “Tordow v2.0” which specifically affected to mobile bank user in Russia has been discovered by Threat Researchers of comodo TRL. spoke person said ,Tordow is the first mobile banking Trojan for the Android operating system that seeks to gain root privileges on infected devices. Root access of mobiles no needed to perform its […]

OMG….Over 1 million Google accounts may have been breached by Gooligan malware

  Check your google account is hacked or not by Gooligan World’s  biggest  Cyber Security  firm checkpoint software revealed today a new and alarming malware campaign. The attack campaign, named Gooligan, breached the security of over one million Google accounts. The number continues to rise at an additional 13,000 breached devices each day. Check Point reached out […]

Your Headphones can act as a spyware

To listen a Audio we need headphones, whereas to record we need Microphones. But Security researchers at Israel’s Ben Gurion University have created a proof-of-concept exploit that lets them turn headphones into microphones to secretly record conversations. Malware that turn Headphone as Microphone In earlier days Headphones was also used as Microphones  because Speakers and microphones […]

Unlock Iphone with Siri – Without password

Unlock Iphone with Siri : Password are the basic level of validation with smartphones, it will acts as a defence for our sensitive data. In the post we are to see how easy to break this password if you are having an Iphone, because of an bur with Siri. Steps to bypass the Authentication Step1 : […]

Chinese IoT Firm Siphoned Text Messages, Call Records

  A Chinese technology firm has been siphoning text messages and call records from cheap Android-based mobile smart phones and secretly sending the data to servers in China, researchers revealed this week. Often retailing for between $50 and $100, the sleek and powerful devices sell so cheaply because they also require the user to accept […]

Torjan for Android Android.Xiny

What is Torjan?(Android.Xiny) Torjan a malicious program, often recognized as trusted application.Once activated they act as backdoor, stealing sensitive information’s and also as spyware. Android.Xiny, Torjan for android device that embedded to games that were published in play store. One this torjan saved to smartphones or tablets it would acquire root privileges, so now it […]