Mobile 22/April/2022 Facial Biometrics: Major Attacks and Mitigations As with every major new development in the security market, this explosion of systems based on facial biometrics has been followed by new and increasingly sophisticated forms of fraud
Intelligence 19/April/2018 Chinese government surveillance app is vulnerable to MITM attacks In a report released last week, the Open Technology Fund (OTF) stated that the JingWang app does not protect users’ private information; and, besides that, it is vulnerable to man-in-the-middle attacks
News 28/March/2018 A false Android app is being used to spy on Iranian citizens The malware used in this campaign infects Android users through a fake version of a VPN application called Psiphon
News 04/September/2017 Conceptual attack uses replacement parts to take control of mobile devices Two initial attacks are described in the study, both happened after the exchange of an original touchscreen module with a malicious version
Uncategorized 05/June/2017 Android: failures that are beyond the code In which ways the appropriation of the Android ecosystem affects its security
News 18/May/2017 Inspeckage, mobile application software analysis, has Tempest’s official support This stamp represents the partnership between Tempest and Antonio Martins, developer of the tool and mobile application anaylsis specialist
Mobile 22/April/2022 Facial Biometrics: Major Attacks and Mitigations As with every major new development in the security market, this explosion of systems based on facial biometrics has been followed by new and increasingly sophisticated forms of fraud
Intelligence 19/April/2018 Chinese government surveillance app is vulnerable to MITM attacks In a report released last week, the Open Technology Fund (OTF) stated that the JingWang app does not protect users’ private information; and, besides that, it is vulnerable to man-in-the-middle attacks
News 28/March/2018 A false Android app is being used to spy on Iranian citizens The malware used in this campaign infects Android users through a fake version of a VPN application called Psiphon
News 04/September/2017 Conceptual attack uses replacement parts to take control of mobile devices Two initial attacks are described in the study, both happened after the exchange of an original touchscreen module with a malicious version
Uncategorized 05/June/2017 Android: failures that are beyond the code In which ways the appropriation of the Android ecosystem affects its security
News 18/May/2017 Inspeckage, mobile application software analysis, has Tempest’s official support This stamp represents the partnership between Tempest and Antonio Martins, developer of the tool and mobile application anaylsis specialist