SolarWinds hackers exploited iOS 0-day to compromise iPhones

According to Google, SolarWinds hackers used the vulnerability to steal web security credentials from Western European government officials. Google published a report on Wednesday to share details of its latest findings on the SolarWinds supply chain attack discovered in 2020. The latest revelation is that SolarWinds hackers learned about and exploited an iOS zero-day vulnerability […]

Hackers could access photos, videos without unlocking your phone

The vulnerability existed in the Facebook Messenger Rooms video chat feature and exposed Android smartphone users to intrusion. Nepalese security researcher Samip Aryal has identified a security vulnerability in the Facebook Messenger Rooms video chat feature that lets attackers access any user’s private Facebook photos and videos or submit posts on their behalf.  Astonishingly, this feat can […]

Apple’s neuralMatch tool will scan iPhones for child abuse content

Apple has developed a system dubbed neuralMatch to locate child sexual abuse material/CSAM, and for now, it will scan iPhones of users in the United States. The perks of the internet are quite obvious and known to all but as they say “with every blessing comes a curse.” Similarly, the digital boom has brought along […]

Linphone SIP Stack Bug Could Let Attackers Remotely Crash Client Devices

Cybersecurity researchers on Tuesday disclosed details about a zero-click security vulnerability in the Linphone Session Initiation Protocol (SIP) stack that could be remotely exploited without any action from a victim to crash the SIP client and cause a denial-of-service (DoS) condition. Tracked as CVE-2021-33056 (CVSS score: 7.5), the issue concerns a NULL pointer dereference vulnerability […]

2 vulnerabilities in Asterisk servers allow hackers to listen to your business phone calls

Cybersecurity specialists report the discovery of two critical vulnerabilities in Asterisk, a popular open source Voice over Internet Protocol (VoIP) telephony solution that provides call center functions. According to the report, successful exploitation of these flaws would allow threat actors to deploy denial of service (DoS) attacks on vulnerable deployments. Below are brief descriptions of […]

This gang was able to unlock stolen iPhone/iPad with the latest iOS and bypass Face ID, Touch ID, passwords and steal money from banking apps. They were finally arrested

Authorities in the Brazilian state of Sao Paulo announced the arrest of multiple individuals identified as members of a gang dedicated to stealing and hacking iPhone devices in order to access victims’ online banking accounts and steal all their money. Authorities consider this to be a highly sophisticated criminal group, capable of bypassing the complex […]

Top 15 hacking tools for doing penetration testing from mobile phones

Pentesting has become one of the main practices of the cybersecurity community and even represents an important source of income for independent researchers and security firms. The most advanced security audits are typically performed on Kali Linux computers with specific hardware requirements, although some scanning processes can be performed using a conventional smartphone or tablet. […]

How to protect your privacy on a smartphone: 12 tips & tricks

Nowadays, privacy on your smartphone plays an increasingly important role in our daily life. Large tech companies want to know more about you. This mainly concerns personal information such as your name, age and place of residence. These companies are also curious about where your interests lie. Companies such as Google or Facebook obtain this […]

How to hack Instagram accounts from a smartphone using Termux

Instagram has become one of the most popular social platforms since its origins, and it has even become a source of income for many people and therefore a target of multiple threat actors. Many users may already know, but it is possible to compromise a user account on this platform using Termux, the terminal emulator […]

WhatsApp is reportedly working on web version without connected phone

When you think of WhatsApp, other than privacy concerns, the first thing that comes to your mind is chats or free video calls. While it’s not far from the truth at all, the world’s most popular instant messaging app won’t require having a phone connected to work in the near future. You can use WhatsApp […]

Vulnerabilities in Qualcomm mobile chips expose smartphones from Samsung, Xiaomi, OnePlus and LG

Cybersecurity specialists reported the finding of a critical vulnerability in Mobile Station Modem (MSM) telephone chips, developed by Qualcomm and compatible with 5G technology. Successful exploitation of this flaw would allow threat actors to access sensitive details including phone numbers, call history and even spy on live calls. This is a series of chip systems […]

$4 billion lawsuit claims Google tracked iPhone users activities

A multi-billion pound British class action lawsuit has been filed against the tech giant Google in the UK Supreme Court. The lawsuit alleges that Google secretly tracked countless iPhone users’ internet activities. SEE: Google collects Android location data even if location service is off The consumer rights group, which?’s former director, Richard Lloyd, leads the […]

Transferring Whatsapp data from iPhone to Android with MobileTrans

Recently, we covered how you could transfer your Whatsapp data from an iPhone to your PC by using MobileTrans. Helping those who may want to switch to Android as well, we’re back with this new piece covering how you could transfer WhatsApp from iPhone to Android. Starting, initially, you need to download the MobileTrans application […]

Features to look for when choosing VoIP phone system

As VoIP is quickly replacing PBX inside big businesses, it can be difficult to know which service provider to choose from. One thing is certain: If you choose well, your phone system will gain flexibility and productivity, while it will also cost less. In fact, a pricing plan is one of the things to take […]

Signal CEO hacks Cellebrite cellphone hacking, cracking tool

Moxie Marlinspike, CEO of Signal states that since Cellebrite itself makes a living from undisclosed vulnerabilities, he decided to disclose the vulnerability to the public rather than informing the company. In December 2020, Cellebrite claimed that it could easily crack Signal’s encryption. However, it seems like tables have turned for the Israel-based software maker since […]

Hacked Android phones mimicked connected TV products for fake ad views

Hackers used malware to hack Android devices to create an Android ad fraud botnet called ‘Pareto’ that mimicked millions of connected TV products to generate fake ad views. Cybersecurity firm Human Security, previously White Ops, has uncovered and disrupted a highly sophisticated botnet-based fraud operation in which hackers managed to infect over one million Android […]

How to use iOS 14.5 privacy settings to turn off iPhone apps tracking

Using iPhone? You can now protect your data and location from being tracked by apps on your device with just a tap, thanks to iOS 14.5. You must be tired of ads popping up on your smartphone’s screen whenever you search for a particular product online. That’s how powerful digital marketing has become. Whatever you […]