Backdoor found in Samsung Galaxy Devices, allows Hackers to remotely access/modify Data

Backdoor found in Samsung Galaxy Devices, allows Hackers to remotely access/modify Data

March 13, 2014Mohit Kumar
Google’s Android operating system may be open source, but the version of Android that runs on most phones, tablets, and other devices inclu...
iOS vulnerability allows to disable 'Find My iPhone' without password

iOS vulnerability allows to disable 'Find My iPhone' without password

February 08, 2014Mohit Kumar
Smartphone manufacturers are adding ways for owners to track and manage their phones if they ever get lost or stolen. Find My iPhone is a se...
Android app that notifies you whenever GPS enabled apps access your location

Android app that notifies you whenever GPS enabled apps access your location

February 01, 2014Mohit Kumar
A team of Researchers at Rutgers University has developed an Android application which will notify you every time, whenever an app insta...
Snapchat's new Security feature Hacked in 30 Minutes; CAPTCHA Cracking tool published

Snapchat's new Security feature Hacked in 30 Minutes; CAPTCHA Cracking tool published

January 25, 2014Mohit Kumar
Snapchat suffered a massive data breach back in December in which 4.6 million usernames and phone numbers were compromised. Earlier this mon...
Government launched 'China Operating System' (COS) to break Andoird and iOS Monopoly

Government launched 'China Operating System' (COS) to break Andoird and iOS Monopoly

January 21, 2014Mohit Kumar
China has always tried to support its homegrown tech industry and even the security concerns over U.S. secret surveillance which gives Chine...
NSA admits to collect 200 Million text messages per day under Project DISHFIRE

NSA admits to collect 200 Million text messages per day under Project DISHFIRE

January 17, 2014Mohit Kumar
After the exposure of various surveillance programs, including PRISM, XKeyscore, MUSCULAR, DROPOUTJEEP in recent revelation, NSA has come...
Judge Ruled - NSA Telephone Metadata Collection violates the Fourth Amendment

Judge Ruled - NSA Telephone Metadata Collection violates the Fourth Amendment

December 17, 2013Mohit Kumar
Big and Good news for all of us. A federal court judge ' Richard J. Leon ' said that he believes, US National Security Agency’s (NSA...
Mouabad Android Malware calling to Premium numbers; Generating revenue for its Master

Mouabad Android Malware calling to Premium numbers; Generating revenue for its Master

December 11, 2013Mohit Kumar
Android platform is a primary target for malware attacks from few years and during 2013, more than 79% of mobile operating malware threats a...
Another Master Key vulnerability discovered in Android 4.3

Another Master Key vulnerability discovered in Android 4.3

November 02, 2013Mohit Kumar
Earlier this year, in the month of July it was first discovered that 99% of Android devices are vulnerable to a flaw called " Android ...
New Android Banking Trojan targeting Korean users

New Android Banking Trojan targeting Korean users

October 24, 2013Mohit Kumar
A very profitable line for mobile malware developers is Android Banking Trojans, which infect phones and steal passwords and other data wh...
Simple, but Critical vulnerability in Verizon Portal revealed users' SMS History

Simple, but Critical vulnerability in Verizon Portal revealed users' SMS History

October 21, 2013Mohit Kumar
A Security researcher discovered a critical privacy vulnerability on Verizon Wireless’s Web-based customer portal that allows anyone to dow...
First ever Malware for Firefox Mobile OS developed by Researcher

First ever Malware for Firefox Mobile OS developed by Researcher

October 18, 2013Mohit Kumar
Firefox OS is a mobile operating system based on Linux and Mozilla ’s Gecko technology, whose environment is dedicated to apps created with...
Vulnerability in WhatsApp allows decrypting user messages

Vulnerability in WhatsApp allows decrypting user messages

October 11, 2013Mohit Kumar
A serious vulnerability in WhatsApp allows anyone who is able to eavesdrop on WhatsApp connection to decrypt users' messages. Whatsapp...
iPhone iOS 7.0.2 Sim Lock Screen Bypass vulnerability

iPhone iOS 7.0.2 Sim Lock Screen Bypass vulnerability

October 08, 2013Mohit Kumar
If you're unlucky enough to lose your Smartphone or have it stolen, anyone who finds the device will also be able to access any content ...
iPhone Fingerprint scanner hack allows attacker to hijack Apple ID using Flight Mode

iPhone Fingerprint scanner hack allows attacker to hijack Apple ID using Flight Mode

October 06, 2013Mohit Kumar
A German security firm SRL claims a vulnerability in Touch ID Fingerprint Scanner and iCloud allows a hacker to access a locked device and...
Anonymous Search engine 'DuckDuckGo' Android app offers Tor integration

Anonymous Search engine 'DuckDuckGo' Android app offers Tor integration

October 03, 2013Mohit Kumar
The world of mobile search is about to get a bit more anonymous. Thanks to the fears over government surveillance and corporate tracking, A...
Android's Firefox app Vulnerability allows hacker to steal files from SD card

Android's Firefox app Vulnerability allows hacker to steal files from SD card

October 01, 2013Mohit Kumar
Mobile Browsers are complicated applications and locking them down against threats is extremely difficult. According to a Mobile Security Re...
Another iPhone lockscreen bypass vulnerability found in iOS 7.02

Another iPhone lockscreen bypass vulnerability found in iOS 7.02

September 30, 2013Mohit Kumar
Here we go again! Earlier this week, Apple released iOS 7.0.2 just to fix some Lockscreen bugs in iOS 7 and but a researcher has found a...