Security News

Memory corruption flaw present in Android, iOS builds WhatsApp has patched a vulnerability it its smartphone code that would allow an attacker to crash a target's app simply by placing a call.…

The CEO of “uncrackable” phone seller, Phantom Secure, has pleaded guilty to helping drug sellers keep their business locked away from the eyes of law enforcement.

A French police officer has been charged with using police intelligence data to power a mobile phone tracking service sold via the dark web.

From Kashmir Hill: Facebook is not content to use the contact information you willingly put into your Facebook profile for advertising. It is also using contact information you handed over for...

Facebook on Thursday confirmed that advertisers were privy to phone numbers given by members of the social network for enhanced security. read more

One poor woman whose phone number was hijacked by robocallers got several calls a day from irate consumers who thought she was trying to market to them.

Cryptomining apps were banned from the Play Store some time ago - but that hasn't stopped the crooks getting cryptojackers past Google...

Fraudsters Hijack Mobile Numbers to Crack Open Bank AccountsIn Australia, it can take as few as 15 minutes to steal someone's phone number, a type of attack known as SIM hijacking. Such attacks...

It's just a number to detect fraud, not a Black Mirror-esque score that's going to rate us all as social misfits unworthy of wedding invitations.

Researchers used AT commands to rewrite device firmware, bypass Android security mechanisms, exfiltrate sensitive device information, and unlock screens.