Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Mobile Security

Mozilla: Lack of Security Protections in Mental-Health Apps Is ‘Creepy’

3 May 2022

Popular apps to support people’s psychological and spiritual well-being can harm them by sharing their personal and sensitive data with …

Tags Apps, Is, Mental Health, Mobile Security, Mozilla

‘CatalanGate’ Spyware Infections Tied to NSO Group

19 April 2022

An unknown zero-click exploit in Apple’s iMessage was used by Israeli-based NSO Group to plant either Pegasus or Candiru malware on …

Tags Infections, Malware, Mobile, Mobile Security, Spyware

Switching to 5G? Know Your Integrated Security Controls

12 April 2022

5G is a big leap in mobile technology. It presents enterprises and service providers with capabilities for advanced applications, content …

Tags Cloud Computing, Cloud Security, Integrated, Mobile, Mobile Security

Google Play Bitten by Sharkbot Info-stealer ‘AV Solution’

8 April 2022

Researchers have found the info-stealing Android malware Sharkbot lurking unsuspected in the depths of the Google Play store under the …

Tags Google Play, IT, Malware, Mobile, Mobile Security

Mobile security startup Zimperium acquired by Liberty Strategic Capital for $525M

29 March 2022

Former U.S. Treasury Secretary Steven Mnuchin, the founder and managing partner of Liberty Strategic Capital, will become the chair of …

Tags IT, Mobile, Mobile Security, News, Zimperium

IAM Secures the New, Perimeter-less Reality

23 March 2022

Necessity may be the mother of invention, and it also drives change. To remain competitive in 2021, companies had to transform …

Tags IAM, Mobile, Mobile Security, Network, New

Zenly Social-Media App Bugs Allow Account Takeover

24 February 2022

Zenly, a social app from Snap that allows users to see the locations of friends and family on a live map, contains a pair of …

Tags Apps, Breach, Bugs, Mobile Security, Security Pro

Web Filtering and Compliances for Wi-Fi Providers

24 February 2022

The demand for public Wi-Fi is increasing constantly due to the increase of smartphone owners and remote workers. Researchers at VPNMentor …

Tags Filtering, Malware, Mobile, Mobile Security, Providers

Samsung Shattered Encryption on 100M Phones

23 February 2022

Samsung shipped an estimated 100 million smartphones with botched encryption, including models ranging from the 2017 Galaxy S8 on up to …

Tags Encryption, Malware, Mobile, Mobile Security, Phones

Gaming, Banking Trojans Dominate Mobile Malware Scene

22 February 2022

The number of cyberattacks launched against mobile users was down last year, researchers have found — but don’t pop the champagne just …

Tags Gaming, Malware, Mobile, Mobile Security, Scene

Xenomorph Malware Burrows into Google Play Users, No Facehugger Required

22 February 2022

An Android trojan dubbed Xenomorph has nested in Google Play, already racking up more than 50,000 downloads from the official app store, …

Tags Google Play, Mobile, Mobile Security, Required, Users

Sharp SIM-Swapping Spike Causes $68M in Losses

10 February 2022

SIM-swapping – the practice of duping mobile carriers into switching a target’s phone services to an attacker-controlled phone – is …

Tags Breach, Hacks, Losses, Mobile, Mobile Security

Will the Metaverse Usher in a Universe of Security Challenges?

7 February 2022

Everyone started talking about the metaverse in the summer of 2021. Facebook CEO Mark Zuckerberg kicked it off with his plan to focus his …

Tags Challenges, Data Protection, Metaverse, Mobile, Mobile Security

Supply-Chain Security Is Not a Problem…It’s a Predicament

2 February 2022

Despite what security vendors might say, there is no way to comprehensively solve our supply-chain security challenges, posits JupiterOne …

Tags Cloud Computing, Cloud Security, Is, Mobile, Mobile Security
Post navigation
Older posts
Page1 Page2 … Page38 Next →
Cookie-Free

NVD

  • CVE-2022-1908 – Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11. …27 May 2022
  • CVE-2022-1909 – Cross-site Scripting (XSS) – Stored in GitHub repository causefx/organizr prior to 2.1.220 …27 May 2022
  • CVE-2022-28394 – EOL Product CVE – Installer of Trend Micro Password Manager (Consumer) versions 3.7.0.1223 …27 May 2022
  • CVE-2022-30687 – Trend Micro Maximum Security 2022 is vulnerable to a link following vulnerability that cou …27 May 2022
  • CVE-2022-30700 – An incorrect permission assignment vulnerability in Trend Micro Apex One and Apex One as a …27 May 2022
  • CVE-2022-30701 – An uncontrolled search path element vulnerability in Trend Micro Apex One and Apex One as …27 May 2022

EXPLOITS

  • qdPM 9.1 – Remote Code Execution (RCE) (Authenticated) (v2)26 May 2022
  • m1k1o’s Blog v.10 – Remote Code Execution (RCE) (Authenticated)23 May 2022
  • OpenCart v3.x Newsletter Module – Blind SQLi23 May 2022
  • Survey Sparrow Enterprise Survey Software 2022 – Stored Cross-Site Scripting (XSS)17 May 2022
  • SDT-CW3B1 1.1.0 – OS Command Injection17 May 2022
  • Showdoc 2.10.3 – Stored Cross-Site Scripting (XSS)17 May 2022

SECURELIST

  • IT threat evolution Q1 202227 May 2022
  • IT threat evolution in Q1 2022. Non-mobile statistics27 May 2022
  • IT threat evolution in Q1 2022. Mobile statistics27 May 2022
  • Managed detection and response in 202126 May 2022
  • The Verizon 2022 DBIR25 May 2022
  • What’s wrong with automotive mobile apps?25 May 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News

Next Page »