“What happens on your iPhone, never stays on your iPhone”. New privacy lawsuit against Apple for monitoring iPhone users

A new complaint has been filed against Apple, accusing the corporation of monitoring iPhone users’ device data even when those users have requested that tracking be turned off. The lawsuit argues that Apple “illegally captures and utilizes customers’ personal information and activities.” In addition, the case alleges that the iPhone giant violated the plaintiff’s right […]

Cisco IP Phones 7800 and 8800 series have a critical vulnerability could allow remote code execution or DoS attack

Customers were warned by Cisco on Thursday that fixes for a high-severity vulnerability that affects certain of the company’s IP phones are currently under development. The vulnerability, which is tracked as CVE-2022-20968, affects Cisco IP phones in the 7800 series and the 8800 series (except for the 8821 series). There is no other way around […]

Bad news! The platform certificates of many phone manufactures have been hacked. These are used to sign trusted apps on Android phones. Now these certificates are being used to certify malicious Android applications

Platform certificates, also known as platform keys, are used by OEM Android device makers to certify the core ROM images of their devices. These images include the Android operating system and any related applications. The application signing certificate that was used to sign the “android” program that was stored on the system image is known […]

Seventy thousand individuals who police believe may have been victims of phone scams are receiving messages with instructions on what they should do next

Over 70,000 individuals are receiving text messages from the police informing them that they have been victims of online banking frauds and providing them with instructions on what they should do next. The communications are being sent out by the Metropolitan Police as a part of the UK’s greatest ever anti-fraud blitz, which is following […]

Don’t even think of taking your real smartphone to FIFA world cup matches in Qatar. Immigration officials will gain access to your phone data forever

It would be wise to get a burner phone if you were traveling to Qatar for the World Cup. Additionally, avoid taking any pictures that would violate the Gulf state’s stringent morals regulations. Football fans are being advised on how to shield themselves from the Qatar World Cup applications’ spying by France’s powerful data protection […]

Critical vulnerability in intercom systems allow access to several government & apartments buildings using just a smartphone with NFC

The research team at cyber security company has identified a flaw that makes it possible to hack video entrance systems with an NFC tag. Promon researchers found that attackers can conduct an attack on the entry system to get the admin passcode using a mobile device with NFC capabilities. Once the passcode has been discovered, […]

VULNERABILITY IN GALAXY STORE ALLOWS ATTACKERS TO EXECUTE MALWARE REMOTELY ON SAMSUNG PHONES WITHOUT USER INTERACTION

A flaw in the Galaxy Store enables remote adversaries to trigger the installation and/or start of an application, resulting in the execution of a remote command on the Samsung phone.Some deeplinks are handled by the Galaxy Store application. You can use a browser or another program to call Deeplink. When Galaxy Store receives appropriate deeplinks, […]

Samsung Galaxy Store Flaw Allows Remote Attacker to Run Code on Affected Phones

A security flaw in the Galaxy Store allows attackers to trigger remote code execution on affected smartphones.  The now patched vulnerability, which affects Galaxy Store version 4.5.32.4, relates to a cross-site scripting (XSS) bug that occurs when handling certain deep links. An independent security researcher has been credited with reporting the issue. Vulnerability Details The […]

2 critical Remote code execution flaws in Qualcomm Chipsets affect billions of smartphones

Twelve new security flaws impacting various chipsets were disclosed in this month’s security advisory for Qualcomm’s devices, two of which have been given a critical severity rating.Two significant flaws in Qualcomm chipsets have been identified that might allow malicious payloads to installed remotely on the Android devices. The first vulnerability, identified as CVE-2022-25748 (CVSS score […]

Critical zero day vulnerability in iOS and macOS affecting iPhone, iPad, iPod and Macs. Update immediately

For a zero-day vulnerability in its macOS and iOS operating systems that has already been exploited, Apple released emergency updates on Monday. In a security advisory alerting users to code execution vulnerabilities in fully patched iPhone, iPad, and macOS devices, Apple verified the vulnerability’s exploitation. The following devices are affected: iPhone 6s and after, all […]

Twilio Hack -Over 1,900 Signal Users’ Phone Numbers were Exposed in the Data Breach

Signal, a cross-platform centralized encrypted instant messaging service declares that a data breach at Cloud Communication Company Twilio exposed almost 1,900 Signal users’ phone numbers. Twilio provides phone number verification services for Signal and notably on August 4th, it disclosed that attackers hacked its network. “All users can rest assured that their message history, contact […]

4TB of confidential data, firmware code of Cellebrite TFS and Cellebrite Mobilogy leaked. UFED tool can be used to unlock any iPhone or Android

A threat actor has leaked 4TB of confidential data from Cellebrite an Israeli digital intelligence company. Cellebrite is an Israeli company specialized in providing forensic tools to security forces and companies, such as extracting data from an encrypted iPhone or Android mobile. It offers services to collect, review, analyze, and manage digital data. Its tools […]