• Apple
  • By Bogdan Popa
  • July 18th, 2017
Apple Again Pressed to Build iPhone Backdoor as Firm Seeks Hacker-Proof Device

Apple Again Pressed to Build iPhone Backdoor as Firm Seeks Hacker-Proof Device

Australia wants Apple to create a backdoor to iPhones

Android Backdoor GhostCtrl Can Steal Everything from a Phone, Spy on Users

Android Backdoor GhostCtrl Can Steal Everything from a Phone, Spy on Users

Security company warns of new form of Android malware

  • Apple
  • By Bogdan Popa
  • July 13th, 2017
No Backdoors: Apple Opens Chinese Data Center but Promises Full Privacy

No Backdoors: Apple Opens Chinese Data Center but Promises Full Privacy

iCloud to be offered with local Chinese firm

WhatsApp Supposed Security Vulnerability Explained Step by Step in Videos

WhatsApp Supposed Security Vulnerability Explained Step by Step in Videos

The man who found the app’s “backdoor” posted two videos

Linux Backdoor Gives Hackers Full Control Over Vulnerable Devices

Linux Backdoor Gives Hackers Full Control Over Vulnerable Devices

Security company ESET detects new wave of Linux attacks

Android Backdoor Found on 700M Phones Sending IMEI, SMS, and Call Logs to China

Android Backdoor Found on 700M Phones Sending IMEI, SMS, and Call Logs to China

Security company analyzed backdoor found in ADUPS firmware

Backdoors Found in Sony’s IP Cameras

Backdoors Found in Sony’s IP Cameras

Hackers could use them to spy on you or launch other attacks

Hackers Hunting Hackers: Backdoor-Infected Phishing Kits for Sale on YouTube

Hackers Hunting Hackers: Backdoor-Infected Phishing Kits for Sale on YouTube

YouTube is being used to sell phishing kits online

FakeFile Trojan Opens Backdoors on Linux Computers, Except openSUSE

FakeFile Trojan Opens Backdoors on Linux Computers, Except openSUSE

Trojan targets desktops, not servers or IoT devices

  • Security
  • By Catalin Cimpanu
  • October 13th, 2016
Android Devices That Contain Foxconn Firmware May Have a Secret Backdoor

Android Devices That Contain Foxconn Firmware May Have a Secret Backdoor

Pork Explosion backdoor affects Foxconn-made devices

New Backdoor Trojan Spreads Through RDP Brute-Force Attacks

New Backdoor Trojan Spreads Through RDP Brute-Force Attacks

Trojan steals app and database passwords, PoS data

  • Security
  • By Catalin Cimpanu
  • September 25th, 2016
Street Fighter V Update Opens Backdoor on Windows PCs

Street Fighter V Update Opens Backdoor on Windows PCs

Capcom rolls back game update after fan anger

Windows PCs Infected with Backdoor Trojan via Microsoft Publisher Files

Windows PCs Infected with Backdoor Trojan via Microsoft Publisher Files

Trojan can steal passwords, log keystrokes

Trifecta Complete: Linux and Windows Backdoor Has a Mac Version as Well

Trifecta Complete: Linux and Windows Backdoor Has a Mac Version as Well

Kaspersky researchers uncover Backdoor.OSX.Mokes

Transmission BitTorrent Client Website Hacked Again to Spread Mac Malware

Transmission BitTorrent Client Website Hacked Again to Spread Mac Malware

Transmission client included the Keydnap backdoor trojan

Botnet of Android Devices Controlled via Twitter Accounts

Botnet of Android Devices Controlled via Twitter Accounts

Botnet built using the Twitoor Android backdoor trojan

This Chinese Router Is Depressingly Insecure and Downright Evil

This Chinese Router Is Depressingly Insecure and Downright Evil

Is this the most insecure router in the world? Probably yes.

 
Want more? Browse: