Human rights charity Amnesty International has found hackers attempted to infect one of their researcher’s phones with malware from Israeli vendor NSO Group
Mobile Threat News Articles
Researchers at EURECOM S3 Group found that they can extract crypto keys from a set of run-of-the-mill communications chips just by listening to the noise it makes.
India-based tech support scams have taken a new turn, using phishing emails targeting Apple users to push them to a fake Apple website. This phishing attack also comes with a twist—it pops up a system dialog box to start a…
Criminals harvest credentials from data breaches and then test them on every website and mobile app imaginable. A small subset of those credentials unlocks accounts because most consumers reuse passwords across multiple site.
Ad-blockers and security software are widely used to prevent unauthorized online monitoring but according to researchers at AdGuard, there are many Chrome and Firefox extensions, and smartphone apps that collect private user data using shady techniques.