Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Android

Spyware Vendors Exploit 0-Days On Android and iOS Devices

30 March 2023

The Threat Analysis Group (TAG) of Google unveiled recently that commercial spyware vendors targeted Android and iOS devices using zero-day …

Tags Android, Apple, Cyber Security News, Devices, iOS

New Wi-Fi Protocol Security Flaw Affecting Linux, Android and iOS Devices

30 March 2023

A group of academics from Northeastern University and KU Leuven has disclosed a fundamental design flaw in the IEEE 802.11 Wi-Fi protocol …

Tags Android, Apple, Devices, Google, iOS

Google TAG shares details about exploit chains used to install commercial spyware

29 March 2023

Google’s Threat Analysis Group (TAG) discovered several exploit chains targeting Android, iOS, and Chrome to install commercial spyware. …

Tags Android, Apple, iOS, Spyware, Vendors

Nexus Android malware targets 450 financial applications

29 March 2023

Nexus Android malware targets 450 financial applications Learn how to protect your organization and users from this Android banking trojan. …

Tags Android, Android malware, Google, Mobile Development, Nexus

Google again accused of willfully destroying evidence in Android antitrust battle

28 March 2023

Google Chat histories handed over by the web giant in ongoing Android antitrust litigation reveal the biz has been systematically …

Tags Android, Google, IT, Mobile Development, News

Spot and Remove Viruses from Your Android Phone

24 March 2023

When it comes to viruses and malware on Android phones, malicious apps are often to blame. They’ll disguise themselves in many ways, such …

Tags Android, Google, Malware, Mobile, Mobile Development

Android-based banking Trojan Nexus now available as malware-as-a-service

24 March 2023

Italian cybersecurity firm Cleafy has found “Nexus”, a new Android Trojan capable of hijacking online accounts and siphoning funds from …

Tags Android, Google, Malware, Mobile Development, Nexus

How to clear your Google search cache on Android (and why you should)

23 March 2023

Anyone who’s concerned about their privacy should regularly clear their Google search cache on Android. Here’s how to do this manually and …

Tags Android, Google, How, IT, Mobile Development

Play Commerce prevented over $2 billion in fraudulent and abusive transactions in 2022

23 March 2023

Google Play Google Play Commerce enables you to monetize your apps and games at scale in over 170 markets, without the complexities and …

Tags Android, Commerce, Google, Google Play, IT

Nexus, an emerging Android banking Trojan targets 450 financial apps

23 March 2023

Experts warn of an emerging Android banking trojan dubbed Nexus that was employed in attacks against 450 financial applications. …

Tags Android, Google, Malware, Mobile Development, Nexus

Smashing Security podcast #314: Photo cropping bombshell, TikTok debates, and real estate scams

23 March 2023

It could be a case of aCropalypse now for Google Pixel users, there’s a warning for house buyers, and just why is TikTok being singled …

Tags Android, Mobile Development, Podcasts, Privacy, Scams

New Android Banking Trojan ‘Nexus’ Promoted As MaaS

22 March 2023

Nexus offers overlay attacks and keylogging activities designed to steal victims’ credentials. It can also steal SMS messages (to obtain …

Tags Android, Google, MaaS, Mobile Development, New

aCropalypse now! Cropped and redacted images suffer privacy fail on Google Pixel smartphones

22 March 2023

Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry …

Tags Android, Mobile Development, Privacy, Security Pro, Vulnerability

Google Pixel phones had a serious data leakage bug – here’s what to do!

21 March 2023

Even if you’ve never used one, you probably know what a VCR is (or was). Short for video cassette recorder, it was how we recorded and …

Tags Android, Google, Google Pixel, Mobile Development, Pixels
Older posts
Page1 Page2 … Page190 Next →
Cookie-Free

NVD

  • CVE-2023-1753 – Weak Password Requirements in GitHub repository thorsten/phpmyfaq prior to 3.1.12. …31 March 2023
  • CVE-2023-1747 – A vulnerability has been found in IBOS up to 4.5.4 and classified as critical. Affected by …31 March 2023
  • CVE-2023-1754 – Improper Input Validation in GitHub repository thorsten/phpmyfaq prior to 3.1.12. …31 March 2023
  • CVE-2023-1769 – A vulnerability, which was classified as problematic, was found in SourceCodester Grade Po …31 March 2023
  • CVE-2023-1759 – Cross-site Scripting (XSS) – Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12 …31 March 2023
  • CVE-2023-1760 – Cross-site Scripting (XSS) – Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12 …31 March 2023

EXPLOITS

  • SOUND4 IMPACT/FIRST/PULSE/Eco v2.x – Unauthenticated Factory Reset31 March 2023
  • Judging Management System v1.0 – Authentication Bypass31 March 2023
  • SOUND4 IMPACT/FIRST/PULSE/Eco v2.x – Remote Command Execution (RCE)31 March 2023
  • Bangresto 1.0 – SQL Injection31 March 2023
  • SOUND4 IMPACT/FIRST/PULSE/Eco v2.x – Authentication Bypass31 March 2023
  • Textpattern 4.8.8 – Remote Code Execution (RCE) (Authenticated)31 March 2023

SECURELIST

  • Selecting the right MSSP: Guidelines for making an objective decision30 March 2023
  • Financial cyberthreats in 202229 March 2023
  • Copy-paste heist or clipboard-injector attacks on cryptousers28 March 2023
  • How scammers employ IPFS for email phishing27 March 2023
  • Understanding metrics to measure SOC effectiveness24 March 2023
  • Developing an incident response playbook23 March 2023
Copyright © 2023 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »