The Hacker News — Most Popular Cyber Security, Hacking News Site: hacking mobile

Built-In Backdoor Found in Popular Chinese Android Smartphones

Built-In Backdoor Found in Popular Chinese Android Smartphones

December 17, 2014Swati Khandelwal
Chinese smartphone manufacturers have been criticized many times for suspected backdoors in its products, the popular Chinese smartphone...
FBI Arrested CEO of 'StealthGenie' for Selling Mobile Spyware Apps

FBI Arrested CEO of 'StealthGenie' for Selling Mobile Spyware Apps

September 30, 2014Wang Wei
The Federal Bureau of Investigation (FBI) has arrested the CEO of a UK-based company for allegedly advertising and selling a spyware a...
Symantec discovered Android Malware Toolkit named Dendroid

Symantec discovered Android Malware Toolkit named Dendroid

March 05, 2014Wang Wei
Android platform is becoming vulnerable day by day and hackers always try to manipulate android by applying novel techniques. In this r...
Screenlogger - A keylogger app for Android and iOS Smartphones

Screenlogger - A keylogger app for Android and iOS Smartphones

January 31, 2014Swati Khandelwal
Are you using a pattern lock for your Smartphone to remain untouched from cyber criminals? But you are not aware that even your swipe ge...
10th Anniversary of the World’s first Mobile Malware 'Cabir'

10th Anniversary of the World’s first Mobile Malware 'Cabir'

January 27, 2014Swati Khandelwal
The year 2014 starts with the formation of new mobile malware like ‘ Android . HeHe ’, with the ability to steal text messages, interce...
Samsung KNOX - An Encrypted Virtual Operating system for Android Devices

Samsung KNOX - An Encrypted Virtual Operating system for Android Devices

January 12, 2014Anonymous
Last year Samsung launched a security feature called ' KNOX ' for high-end enterprise mobile devices. It's a nice security addit...
Smartphones cache poses huge risk for Cloud Storage Security

Smartphones cache poses huge risk for Cloud Storage Security

March 27, 2013Wang Wei
A couple of years ago, the tech world was abuzz about the cloud. Cloud computing refers to computing where the processing or storage takes p...
T-Mobile Wi-Fi Calling App vulnerable to Man-in-the-Middle attack

T-Mobile Wi-Fi Calling App vulnerable to Man-in-the-Middle attack

March 22, 2013Mohit Kumar
T-Mobile devices having a default Wi-Fi Calling feature that keeps you connected in areas with little or no coverage using Wi-Fi connect...
How to bypass iOS 6.1.2 Screen Lock, another Exploit Exposed

How to bypass iOS 6.1.2 Screen Lock, another Exploit Exposed

February 26, 2013Mohit Kumar
After a series of security issues, it appears that Apple still has not been able to resolve all the issue in iOS . Last week, Apple roll...
Smartphone wireless chipset vulnerable to DoS attack

Smartphone wireless chipset vulnerable to DoS attack

October 25, 2012Mohit Kumar
Security researcher Andres Blanco from CoreSecurity discovered a serious vulnerability in two Wireless Broadcom chipsets used in Smartphone...