First the good news – you have to have physical control of the iPhone in order to make this hack work. Now the bad news – there is more than one YouTube video describing how to do it. Too bad the FBI didn’t see the videos before they tried to get Apple to unlock the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
When is a hack not a hack? When an Israeli company sells it as a feature. The company, NSO Group, sells the software, to governments among others. The software allows the attacker to: Control the camera Listen to the microphone Track the phone’s location Intercept text messages Intercept emails Download the calendar data Download your […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Jonathan Zdziarski wrote about an implementation challenge for the security conscious among us. While Whatsapp does delete the message when you tell it to, it leaves artifacts behind. Whatsapp and other phone apps use the SQLLite database. SQLLite, likely to reduce wear in your phone’s memory, doesn’t actually delete the message, but rather just marks […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
About a year ago, Android users were fighting something called the Stagefright bug. Buried deep in the bowels of the operating system was a series of bugs that would allow an attacker to send you a specially crafted text message and take over your Android phone. Stagefright affected close to a billion phones in the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
There is a lot of ink (digital ink that is) being spilled on the topic of ad supported content. The basic theory is that ad supported content allows you the reader to get a lot of content without having to shell out cash. Notice that I didn’t say the content is free. It is not. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Now that Apple is becoming a more mainstream IT player rather than just a consumer electronics vendor, hackers are starting to take more notice. Appthority, an application risk analysis and mitigation firm has announced Quicksand, an iOS vulnerability that allows malicious apps or anyone who can get physical access to an iOS device to steal […]
Continue reading →
[DISPLAY_ACURAX_ICONS]