A fost publicată lista furnizorilor de servicii de formare pentru securitate cibernetică
Accesați pagina

Vulnerabilities of the implementations of the cryptographic of the mobile terminals with iOS and Android

2016/03/07
Popularity 1019

A team of researchers coming from the University of Tel Aviv, Techion and the University of Adelaide has found one way that an attacker could steal the encryption keys used to protect the accounts type wallet (wallet): Bitcoin, Apple Pay, and other sensitive services within the Android and iOS opera ... Read more ->


STAGEFRIGHT: Vulnerabilities of the Android operating system

2015/07/29
Popularity 976

Mobile devices running a version of the operating system Android, from îbetween version 2.2 and version 5.1.1_r4, contain multiple vulnerabilities of the engine of the multimedia playback Stagefright. Exploitation of these vulnerabilities may allow an attacker to access your multimed ... Read more ->


Vulnerability in the Android operating system: Installer Hijacking

2015/03/25
Popularity 1091

Recently a group of researchers from the company Palo Alto Networks has published an article on the vulnerability of the Android operating system, which they called Android Installer Hijacking, estimating that affects nearly half of current users of Android. According to information published in th ... Read more ->