During a presentation at DEF CON last week, Check Point security researcher Slava Makkaveev revealed how vulnerabilities in the compute digital-signal processor (DSP) – a subsystem that enables the processing of data with low power consumption – could open the door for Android applications to perform malicious attacks. The proprietary subsystem is licensed for programming…

Increased Focus on iOS Hacking Leads to Drop in Exploit Prices

Exploit acquisition company Zerodium announced last week that it would no longer be buying certain types of iOS exploits for the next 2-3 months due to surplus. It also announced that prices for iOS exploit chains that require some user interaction and don’t provide persistence will likely drop in the near future. Furthermore, Zerodium’s CEO…

Czech, US to Cooperate on Security of 5G Networks

The Czech government office said the document was signed remotely by Czech Prime Minister Andrej Babis and U.S. Secretary of State Mike Pompeo. The signing comes amid a global battle between the U.S. and China’s Huawei, the world’s biggest maker of network infrastructure equipment. Huawei has become the target of U.S. security concerns because of…

While most people will say they are extremely concerned with their online privacy, previous experiments have shown that, in practice, users readily divulge privacy information online. A team of Penn State researchers identified a dozen subtle – but powerful – reasons that may shed light on why people talk a good game about privacy, but…

The move brings together the largest mobile operating systems in an effort to use smartphone location technology to track and potentially contain the global COVID-19 outbreak. The move would allow apps to be created enabling smartphones powered by Apple software and Google-backed Android operating system to exchange information with a joint “opt in system” using…

Governments worldwide have released COVID-19 mobile apps to provide citizens with useful information and, in some cases, to track individuals in an effort to contain the coronavirus outbreak. An analysis of dozens of nation and government-sponsored mobile applications for Android released to help with the current COVID-19 pandemic has revealed the existence of privacy risks,…

Hackers are using hidden mobile apps, third-party login and counterfeit gaming videos to target consumers, according to McAfee. Last year, hackers targeted consumers with a wide variety of methods, from backdoors to mining cryptocurrencies. Hackers have expanded the ways of hiding their attacks, making them increasingly difficult to identify and remove, which makes it seem…