BrutePrint Attack allows to unlock smartphones with brute-forcing fingerprint

Researchers devised an attack technique, dubbed BrutePrint Attack, that allows brute-forcing fingerprints on smartphones to bypass authentication. Researchers have devised an attack technique, dubbed BrutePrint, that allows to brute-force fingerprints on smartphones to bypass user authentication. The attack technique exploits two zero-day vulnerabilities, called Cancel-After-Match-Fail (CAMF) and Match-After-Lock (MAL), in the smartphone fingerprint authentication (SFA) […]

The post BrutePrint Attack allows to unlock smartphones with brute-forcing fingerprint appeared first on Security Affairs.

May 30, 2023
Read More >>

Researchers analyzed the PREDATOR spyware and its loader Alien

Cisco Talos and the Citizen Lab researchers have published a technical analysis of the powerful Android spyware Predator. Security researchers at Cisco Talos and the Citizen Lab have shared technical details about a commercial Android spyware named Predator that is sold by the surveillance firm Intellexa (formerly known as Cytrox). The researchers focused their analysis […]

The post Researchers analyzed the PREDATOR spyware and its loader Alien appeared first on Security Affairs.

May 29, 2023
Read More >>

New Apple RSR Flaw Blocks MDM Functionality on macOS Devices

Addigy, which provides management solutions for Apple devices, today warned that Apple’s new Rapid Security Response (RSR) updates aren’t being delivered to as many as 25 percent of macOS devices in managed environments, and that the failure to do so is also impacting mobile device management (MDM) stacks on those devices. RSR updates are new […]

The post New Apple RSR Flaw Blocks MDM Functionality on macOS Devices appeared first on eSecurityPlanet.

May 24, 2023
Read More >>

AhRat Android RAT was concealed in iRecorder app in Google Play

ESET found a new remote access trojan (RAT), dubbed AhRat, on the Google Play Store that was concealed in an Android screen recording app. ESET researchers have discovered an Android app on Google Play that was hiding a new remote access trojan (RAT) dubbed AhRat. The app, named iRecorder – Screen Recorder, has more than […]

The post AhRat Android RAT was concealed in iRecorder app in Google Play appeared first on Security Affairs.

May 24, 2023
Read More >>

Google announced its Mobile VRP (vulnerability rewards program)

Google introduced Mobile VRP (vulnerability rewards program), a new bug bounty program for reporting vulnerabilities in its mobile applications. Google announced a new bug bounty program, named Mobile VRP (vulnerability rewards program), that covers its mobile applications. Google’s Mobile VRP is a bug bounty program for reporting vulnerabilities in first-party Android applications developed or maintained […]

The post Google announced its Mobile VRP (vulnerability rewards program) appeared first on Security Affairs.

May 23, 2023
Read More >>

A Threat to Passkeys? BrutePrint Attack Bypasses Fingerprint Authentication

Security researchers recently published a paper detailing an attack they say can be used to bypass smartphone fingerprint authentication. Yiling He of China’s Zhejiang University and Yu Chen of Tencent Security’s Xuanwu Lab are calling the attack BrutePrint, which they say can be used to hijack fingerprint images. An attack like BrutePrint could present a […]

The post A Threat to Passkeys? BrutePrint Attack Bypasses Fingerprint Authentication appeared first on eSecurityPlanet.

May 23, 2023
Read More >>

Lemon Group gang pre-infected 9 million Android devices for fraudulent activities

The Lemon Group cybercrime ring has reportedly pre-installed malware known as Guerilla on almost 9 million Android devices. A cybercrime group tracked has Lemon Group has reportedly pre-installed malware known as Guerilla on almost 9 million Android devices. Infected devices were used for multiple malicious activities, including traffic redirections through mobile proxies, info-stealing, click fraud, and […]

The post Lemon Group gang pre-infected 9 million Android devices for fraudulent activities appeared first on Security Affairs.

May 19, 2023
Read More >>

Apple fixed three new actively exploited zero-day vulnerabilities

Apple released security updates to address three zero-day vulnerabilities in iPhones, Macs, and iPads that are actively exploited in attacks. Apple has addressed three new zero-day vulnerabilities that are actively exploited in attacks in the wild to hack into iPhones, Macs, and iPads. The three vulnerabilities, tracked as CVE-2023-32409, CVE-2023-28204, and CVE-2023-32373, reside in the […]

The post Apple fixed three new actively exploited zero-day vulnerabilities appeared first on Security Affairs.

May 19, 2023
Read More >>

How to Transfer Data between Android and PC Seamlessly

Sharing files between an Android device and a PC is a common need for years. Whether you want to transfer data from your phone to your computer or vice versa, you get tons of methods to do so. But there was no official, quicker, and seamless way for this until now. Google has recently been […]

The post How to Transfer Data between Android and PC Seamlessly first appeared on Internet Security Blog – Hackology.

May 13, 2023
Read More >>

Fleckpe Android malware totaled +620K downloads via Google Play Store

Fleckpe is a new Android subscription Trojan that was discovered in the Google Play Store, totaling more than 620,000 downloads since 2022. Fleckpe is a new Android subscription Trojan that spreads via Google Play, the malware discovered by Kaspersky is hidden in photo editing apps, smartphone wallpaper packs, and other general-purpose apps. The malicious campaign […]

The post Fleckpe Android malware totaled +620K downloads via Google Play Store appeared first on Security Affairs.

May 5, 2023
Read More >>