Mobile & Wireless

Samsung Patches Zero-Day Exploited Against Android Users

Samsung Patches Zero-Day Exploited Against Android Users 2025-09-15 at 11:21 By Ionut Arghire Reported by Meta and WhatsApp, the vulnerability leads to remote code execution and was likely exploited by a spyware vendor. The post Samsung Patches Zero-Day Exploited Against Android Users appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original […]

React to this headline:

Loading spinner

Samsung Patches Zero-Day Exploited Against Android Users Read More »

Remote CarPlay Hack Puts Drivers at Risk of Distraction and Surveillance

Remote CarPlay Hack Puts Drivers at Risk of Distraction and Surveillance 2025-09-11 at 13:27 By Eduard Kovacs Oligo Security has shared details on an Apple CarPlay attack that hackers may be able to launch without any interaction. The post Remote CarPlay Hack Puts Drivers at Risk of Distraction and Surveillance appeared first on SecurityWeek. This

React to this headline:

Loading spinner

Remote CarPlay Hack Puts Drivers at Risk of Distraction and Surveillance Read More »

Apple Unveils iPhone Memory Protections to Combat Sophisticated Attacks

Apple Unveils iPhone Memory Protections to Combat Sophisticated Attacks 2025-09-10 at 15:54 By Eduard Kovacs Apple’s new Memory Integrity Enforcement (MIE) brings always-on memory-safety protection covering key attack surfaces — including the kernel and over 70 userland processes. The post Apple Unveils iPhone Memory Protections to Combat Sophisticated Attacks appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

Apple Unveils iPhone Memory Protections to Combat Sophisticated Attacks Read More »

Apple Seeks Researchers for 2026 iPhone Security Program

Apple Seeks Researchers for 2026 iPhone Security Program 2025-09-04 at 18:23 By Eduard Kovacs Security researchers interested in participating in the 2026 Apple Security Research Device program can apply until October 31. The post Apple Seeks Researchers for 2026 iPhone Security Program appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original

React to this headline:

Loading spinner

Apple Seeks Researchers for 2026 iPhone Security Program Read More »

Two Exploited Vulnerabilities Patched in Android

Two Exploited Vulnerabilities Patched in Android 2025-09-04 at 11:40 By Ionut Arghire Elevation of privilege flaws in Android Runtime (CVE-2025-48543) and Linux kernel (CVE-2025-38352) have been exploited in targeted attacks. The post Two Exploited Vulnerabilities Patched in Android appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this

React to this headline:

Loading spinner

Two Exploited Vulnerabilities Patched in Android Read More »

Novel 5G Attack Bypasses Need for Malicious Base Station

Novel 5G Attack Bypasses Need for Malicious Base Station 2025-08-18 at 18:32 By Eduard Kovacs Researchers detailed a new 5G attack named Sni5Gect that can allow attackers to sniff traffic  and cause disruption. The post Novel 5G Attack Bypasses Need for Malicious Base Station appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Novel 5G Attack Bypasses Need for Malicious Base Station Read More »

Google Says Android pKVM Earns Highest Level of Security Assurance

Google Says Android pKVM Earns Highest Level of Security Assurance 2025-08-15 at 13:07 By Eduard Kovacs Android pKVM has achieved SESIP Level 5 certification, which means it’s resistant to highly skilled, motivated, and funded attackers. The post Google Says Android pKVM Earns Highest Level of Security Assurance appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Google Says Android pKVM Earns Highest Level of Security Assurance Read More »

Approov Raises $6.7 Million for Mobile App Security

Approov Raises $6.7 Million for Mobile App Security 2025-08-05 at 16:42 By Ionut Arghire Approov has raised $6.7 million in Series A funding to advance its mobile application and API security solutions. The post Approov Raises $6.7 Million for Mobile App Security appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original

React to this headline:

Loading spinner

Approov Raises $6.7 Million for Mobile App Security Read More »

Android’s August 2025 Update Patches Exploited Qualcomm Vulnerability

Android’s August 2025 Update Patches Exploited Qualcomm Vulnerability 2025-08-05 at 13:16 By Ionut Arghire Android’s light August 2025 security update resolves an Adreno GPU vulnerability confirmed as exploited in June. The post Android’s August 2025 Update Patches Exploited Qualcomm Vulnerability appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React

React to this headline:

Loading spinner

Android’s August 2025 Update Patches Exploited Qualcomm Vulnerability Read More »

Surveillance Firm Bypasses SS7 Protections to Retrieve User Location

Surveillance Firm Bypasses SS7 Protections to Retrieve User Location 2025-07-21 at 13:02 By Ionut Arghire A surveillance company was caught using an SS7 bypass technique to trick wireless carriers into divulging users’ locations. The post Surveillance Firm Bypasses SS7 Protections to Retrieve User Location appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Surveillance Firm Bypasses SS7 Protections to Retrieve User Location Read More »

Mobile Forensics Tool Used by Chinese Law Enforcement Dissected

Mobile Forensics Tool Used by Chinese Law Enforcement Dissected 2025-07-17 at 14:46 By Ionut Arghire Deployed on mobile devices confiscated by Chinese law enforcement, Massistant can collect user information, files, and location. The post Mobile Forensics Tool Used by Chinese Law Enforcement Dissected appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View

React to this headline:

Loading spinner

Mobile Forensics Tool Used by Chinese Law Enforcement Dissected Read More »

July 2025 Breaks a Decade of Monthly Android Patches

July 2025 Breaks a Decade of Monthly Android Patches 2025-07-11 at 11:33 By Ionut Arghire Since August 2015, Google has delivered a constant stream of monthly security patches for Android. Until July 2025. The post July 2025 Breaks a Decade of Monthly Android Patches appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

July 2025 Breaks a Decade of Monthly Android Patches Read More »

eSIM Hack Allows for Cloning, Spying 

eSIM Hack Allows for Cloning, Spying  2025-07-10 at 17:32 By Eduard Kovacs Details have been disclosed for an eSIM hacking method that could impact many, but the industry is taking action. The post eSIM Hack Allows for Cloning, Spying  appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to

React to this headline:

Loading spinner

eSIM Hack Allows for Cloning, Spying  Read More »

Samsung Announces Security Improvements for Galaxy Smartphones

Samsung Announces Security Improvements for Galaxy Smartphones 2025-07-09 at 15:29 By Ionut Arghire New Samsung Galaxy features include protections for on-device AI, expanded cross-device threat detection, and quantum-resistant encryption for network security. The post Samsung Announces Security Improvements for Galaxy Smartphones appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source

React to this headline:

Loading spinner

Samsung Announces Security Improvements for Galaxy Smartphones Read More »

Unpatched Ruckus Vulnerabilities Allow Wireless Environment Hacking

Unpatched Ruckus Vulnerabilities Allow Wireless Environment Hacking 2025-07-09 at 13:18 By Ionut Arghire Multiple vulnerabilities in Ruckus Wireless management products could be exploited to fully compromise the managed environments. The post Unpatched Ruckus Vulnerabilities Allow Wireless Environment Hacking appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this

React to this headline:

Loading spinner

Unpatched Ruckus Vulnerabilities Allow Wireless Environment Hacking Read More »

Undetectable Android Spyware Backfires, Leaks 62,000 User Logins

Undetectable Android Spyware Backfires, Leaks 62,000 User Logins 2025-07-03 at 14:32 By Ionut Arghire A vulnerability in the Catwatchful spyware allowed a security researcher to retrieve the usernames and passwords of over 62,000 accounts. The post Undetectable Android Spyware Backfires, Leaks 62,000 User Logins appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Undetectable Android Spyware Backfires, Leaks 62,000 User Logins Read More »

Airoha Chip Vulnerabilities Expose Headphones to Takeover

Airoha Chip Vulnerabilities Expose Headphones to Takeover 2025-06-30 at 14:11 By Ionut Arghire Vulnerabilities in Airoha Bluetooth SoCs expose headphone and earbud products from multiple vendors to takeover attacks. The post Airoha Chip Vulnerabilities Expose Headphones to Takeover appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this

React to this headline:

Loading spinner

Airoha Chip Vulnerabilities Expose Headphones to Takeover Read More »

Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play

Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play 2025-06-24 at 12:45 By Ionut Arghire Newly discovered spyware has sneaked into Apple’s App Store and Google Play to steal images from users’ mobile devices. The post Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play Read More »

The ZTNA Blind Spot: Why Unmanaged Devices Threaten Your Hybrid Workforce

The ZTNA Blind Spot: Why Unmanaged Devices Threaten Your Hybrid Workforce 2025-06-12 at 14:03 By Etay Maor It’s time for enterprises to stop treating unmanaged devices as an edge case and start securing them as part of a unified Zero Trust strategy. The post The ZTNA Blind Spot: Why Unmanaged Devices Threaten Your Hybrid Workforce

React to this headline:

Loading spinner

The ZTNA Blind Spot: Why Unmanaged Devices Threaten Your Hybrid Workforce Read More »

Chinese Hackers and User Lapses Turn Smartphones Into a ‘Mobile Security Crisis’

Chinese Hackers and User Lapses Turn Smartphones Into a ‘Mobile Security Crisis’ 2025-06-09 at 21:33 By Associated Press Foreign hackers have increasingly identified smartphones, other mobile devices and the apps they use as a weak link in U.S. cyberdefenses. The post Chinese Hackers and User Lapses Turn Smartphones Into a ‘Mobile Security Crisis’ appeared first

React to this headline:

Loading spinner

Chinese Hackers and User Lapses Turn Smartphones Into a ‘Mobile Security Crisis’ Read More »

Scroll to Top