Drammer: a ‘Deterministic Rowhammer Attack’ to gain root permissions on Android devices

A new attack technique that exploits the Rowhammer hardware vulnerability on Android devices Earlier last year, security researchers from Google’s Project Zero discovers Rowhammer, a hardware bug that allows attackers to manipulate data in memory without accessing it: by reading many times from a specific memory location, somewhere else in memory a bit may flip (a…

How much is difficult realize a malware ignored by antimalware solutions?

Pretty simple, according to recent researches! A group of the researchers from the Iswatlab team at the University of Sannio demonstrated how is easy to create a mobile malware that eludes antivirus solutions. The research was conducted by Corrado Aaron Visaggio and Francesco Mercaldo, who realized an engine that applies the following transformations chain to…

10 tips to secure your mobile phone, by MalwareBytes

Some are useful, others a little trivial Recently i have read a useful article in MalwareBytes Blog, that shares 10 tips for securing mobile devices. Just last month, vulnerabilities in iOS 9.3.5 were being exploited by the notorious NSO Group, maker of surveillance software, to read text messages and emails, record sounds, collect passwords, and even…