How to hack an Android smartphone with Evil Droid
The use of hidden malware in mobile applications outside official platforms such as the Play Store or AppStore is one of the main infection mechanisms used by cybercriminal groups, sinceRead More →
The use of hidden malware in mobile applications outside official platforms such as the Play Store or AppStore is one of the main infection mechanisms used by cybercriminal groups, sinceRead More →
WhatsApp is one of the most attractive targets for hackers looking to deploy electronic fraud campaigns, as it represents a point of access to a large amount of confidential information.Read More →
Researchers from Google Threat Analysis Group (TAG) report that in 2021, software development firm Cytrox sold Predator spyware to various hacking groups backed by state actors. These attacks are basedRead More →
As part of its latest policy update, Apple has warned developers that their apps will be removed from the App Store if they haven’t received updates for the past threeRead More →
QR code (Quick Response) is the name by which we all know the modules to store information in a dot matrix or in a two-dimensional barcode. This matrix is readRead More →
Play Store security teams confirmed that SharkBot, a dangerous banking malware distributed through fake antivirus tools, has finally been removed from Google official repository. SharkBot was first spotted on theRead More →
A few months ago, specialists from the security firm ThreatFabric reported the detection of a new malware variant for Android devices. Identified as Coper, this malware family appeared to beRead More →
Cybersecurity specialists report the detection of a new Linux vulnerability that also impacts Android 12 devices, including Samsung Galaxy S22 and Google Pixel 6 smartphones. Tracked as CVE-2022-0847 and alsoRead More →
Mobile hacking is one of the most dangerous cybercriminal trends, as it allows threat actors to conduct detailed surveillance of people of interest, steal personal information, and even empty bank accountsRead More →
© 2024 All Rights Reserved
info@iicybersecurity.com