Browsing Category: Mobile Security

shutterstock_186174413

Side-Channel Android Weakness Likely on Other Platforms

Researchers have discovered a weakness in Android that is likely present in other leading operating systems that can be abused and lead to information leakage.

Read more...

firefox

Mozilla Adding Granular App Permissions to Firefox OS

Mozilla is set to add a feature to its mobile Firefox OS that will give users the ability to revoke any application’s permissions on a granular basis. Firefox OS is the open source operating system that Mozilla built for smartphones. The software runs on a variety of devices from manufacturers such as Alcatel, ZTE and[...]

Read more...

blackberry z10

Authentication Bypass Bug Fixed in BlackBerry Z10

There’s a remotely exploitable authentication bypass vulnerability in the BlackBerry Z10 phone that affects the service that lets users share files with machines on a wireless network. The bug could allow an attacker to steal users’ personal data or hit them with targeted malware.

Read more...

BlackHat keynote_Geer

Podcast: Black Hat News Wrap

Dennis Fisher, Mike Mimoso and Brian Donohue discuss the news from day one of Black Hat, including the Dan Geer keynote, attacks on mobile broadband modems and carriers’ control of mobile phones. Download: Black-Hat-Day-One-Podcast.mp3 Music by Chris Gonsalves  

Read more...

Mass Cellular Exploitation

Pervasive OTA Carrier Controls Exploitable on a Massive Scale

Categories: Hacks, Mobile Security

Las Vegas – Researchers at the Black Hat security conference claimed in a presentation that they can exploit pervasive carrier controls to wrest complete control of billions of consumer devices.

Read more...

black hat stage

Mobile Broadband Modems Seen as Easy Targets for Attackers

LAS VEGAS–Mobile broadband modems can be a great alternative if you can’t find a WiFi network or don’t trust the ones you can find. But many of the models sold by the major manufacturers contain bugs and functionality that a remote attacker can exploit without much difficulty. Much of the market for these devices is[...]

Read more...