Summary

Top Articles:

  • Threema Goes Open Source, Welcomes New Partner
  • Exploiting 0-click Android Bluetooth vulnerability to inject keystrokes without pairing
  • Using WiFi connection probe requests to track users
  • Google addresses actively exploited Android flaw in the kernel
  • Telegram is becoming the paradise of cyber criminals
  • WhatsApp CVE-2020-1910 bug could have led to user data exposure
  • Flaws in mobile Internet protocol GTP allow hackers to target 5G users

Exploiting 0-click Android Bluetooth vulnerability to inject keystrokes without pairing

Published: 2024-01-24 10:48:58

Popularity: 162

Author: deejayy@users.lobste.rs (deejayy)

Keywords:

  • security
  • mobile
  • Comments

    ...more

    Using WiFi connection probe requests to track users

    Researchers at the University of Hamburg demonstrated that WiFi connection probe requests expose users to track. A group of academics at the University of Hamburg (Germany) demonstrated that it is possible to use WiFi connection probe requests to identify and track devices and thereby their users. Mobile devices transmit probe requests to receive information about […] The post Using WiFi connection probe requests to track users appeared first on Security Affairs.

    ...more

    Google addresses actively exploited Android flaw in the kernel

    Google released the May security bulletin for Android, 2022-05-05 security patch level, which fixed an actively exploited Linux kernel flaw. Google has released the second part of the May Security Bulletin for Android, which includes a fix for an actively exploited Linux kernel vulnerability tracked as CVE-2021-22600. The CVE-2021-22600 is a privilege escalation issue that […] The post Google addresses actively exploited Android flaw in the kernel appeared first on Security Affairs.

    ...more

    Telegram is becoming the paradise of cyber criminals

    Telegram is becoming an essential platform for cybercriminal activities, crooks use it but and sell any kind of stolen data and hacking tools. Many experts believe that the popular Telegram app is an efficient alternative to dark web marketplaces, its channels are used by hacking communities and cybercriminals to buy and sell stolen data, accesses […] The post Telegram is becoming the paradise of cyber criminals appeared first on Security Affairs.

    ...more

    WhatsApp CVE-2020-1910 bug could have led to user data exposure

    The now-fixed CVE-2020-1910 vulnerability in WhatApp ‘s image filter feature could have exposed user data to remote attackers. A high-severity security vulnerability in WhatApp’s image filter feature, tracked as CVE-2020-1910, could have been exploited by attackers to read sensitive information from the app’s memory by simply sending a specially crafted image over the messaging app […] The post WhatsApp CVE-2020-1910 bug could have led to user data exposure appeared first on Security Affairs.

    ...more

    Threema Goes Open Source, Welcomes New Partner

    Published: 2020-09-04 20:59:39

    Popularity: 209

    Author: atoponce@users.lobste.rs (atoponce)

    Keywords:

  • security
  • mobile
  • release
  • Comments

    ...more

    Flaws in mobile Internet protocol GTP allow hackers to target 5G users

    Security vulnerabilities in modern communication protocol GTP used by mobile network operators can be exploited by attackers to target 4G/5G users. Researchers at cybersecurity firm Positive Technologies Security have discovered several vulnerabilities in communication protocol GPRS Tunnelling Protocol (GTP), that is used by mobile network operators (MNOs). Threat actors could exploit these flaws to conduct several […] The post Flaws in mobile Internet protocol GTP allow hackers to target 5G users appeared first on Security Affairs.

    ...more

    end