Smartphones

Trevor Spiniolas is a renowned mobile security researcher who has reported various issues and bugs affecting multiple commonly used technological devices. In his latest report, the expert details the findingRead More →

Determining the location of a device is one of the most complex hacking tasks, although there are several tools that can incredibly simplify this process, reducing everything to a matterRead More →

Kali Linux is one of the best and most popular ethical hacking and security auditing tools, as it allows cybersecurity experts to run all the hardware of a system andRead More →

A recent investigation claims that a set of mobile apps available in Google official store and accumulating more than 300,000 downloads contain banking Trojans capable of stealing login credentials andRead More →

Although sometimes the concept has a negative connotation, hacking can be very useful for totally legitimate purposes in various fields, including the use of smart devices. According to mobile hackingRead More →

A recent report notes that a British company engaged in the sale of location details acknowledged that part of the records sold was obtained without the prior consent of theRead More →

In a security alert, Apple announced the release of iOS 15.0.2 and iPadOS 15.0.2 versions, which contain a patch to address a recently actively exploited zero-day flaw. Tracked as CVE-2021-30883,Read More →

Cybersecurity specialists report the detection of a critical vulnerability in Apple AirTag whose exploitation would allow threat actors to find the phone number of a target user and even redirectRead More →

On Thursday, the security researcher known as Illusion of Chaos revealed multiple details about three zero-day vulnerabilities in iOS, ensuring that Apple received reports about these flaws for months andRead More →