#mobileSecurity

2026-01-30

Hugging Face infrastructure was recently leveraged in an Android malware campaign distributing thousands of polymorphic APK variants.

The operation relied on user deception, accessibility abuse, and trusted content delivery paths rather than zero-day exploitation - reinforcing the role of social engineering and platform trust in modern mobile threats.

How are teams accounting for abuse of legitimate platforms?

Follow @technadu for balanced infosec reporting.

#Infosec #AndroidMalware #HuggingFace #ThreatIntelligence #MobileSecurity #CyberDefense

Hugging Face abused to spread thousands of Android malware variants
2026-01-29

New by me: CybersecKyle Security How-To Series (Everyday Defense), Part 4 🔒📱
Phone hardening you can live with.

Most phone takeovers aren’t zero-days. It’s stolen devices, SIM swaps, lock screen notification leaks, and apps with way too much access. This guide lays out a practical baseline you’ll actually keep enabled, plus quick validation drills to prove your settings are doing what you think they’re doing.

Read: kylereddoch.me/blog/cybersecky

#CybersecKyleHowTo #EverydayDefense #MobileSecurity #Privacy #Cybersecurity

2026-01-22

Greek police arrested scammers using a fake cell tower for SMS phishing.

Phones were forced onto insecure 2G networks to harvest data and send bank-themed smishing.

technadu.com/greek-police-arre

Thoughts?

#Smishing #MobileSecurity #InfoSec

Greek Police Arrest Scammers in Athens Using Fake Cell Tower for SMS Phishing Operation
OWASP Foundationowasp@infosec.exchange
2026-01-20

🔥 Hack Android, iOS & IoT Apps!
Train with Abraham Aranguren in a 3-day intensive course at OWASP London Training Days.
CTFs, real challenges, Frida & Objection, built on OWASP MSTG & MASVS.
👉 londonowasptrainingdays2025.sc

#appsec #mobilesecurity #iot #owasp

techputstechputs
2026-01-20

Worried your phone might be tracked without your knowledge?

I published a detailed guide covering real warning signs, how to check Android and iPhone, and practical steps to protect your privacy.

Read here:
👉 techputs.com/how-to-know-if-yo

Is your phone being tracked?
BiyteLümbiytelum
2026-01-14

This one’s worth revisiting.

Your phone’s operating system isn’t neutral — it defines what data is collected, where it goes, and who controls it.

Android and iOS optimize for ecosystems.
There are alternatives if privacy actually matters.

medium.com/@biytelum/your-phon

2026-01-13

The FBI warns of “quishing” attacks by a North Korean APT — QR codes used to steal credentials and bypass filters. When scanning replaces clicking, awareness must follow. 📱🎯 #Quishing #MobileSecurity

darkreading.com/mobile-securit

2026-01-09

HSBC’s mobile app reportedly restricts access on devices with sideloaded apps, impacting users who installed Bitwarden via F-Droid.

No malicious behavior has been alleged, and the situation appears tied to app-source detection rather than app function.

A practical example of how mobile threat models and platform controls can impact legitimate security tooling.

Source: theregister.com/2026/01/07/hsb

Follow TechNadu for objective infosec reporting.

#Infosec #MobileSecurity #OpenSource #AppIntegrity #RiskManagement #CyberSecurity

HSBC app takes a dim view of sideloaded Bitwarden installations
2026-01-08

Android Pentesting Lab - Ultimate Setup Guide (2026)
This article provides a comprehensive guide for setting up an Android pentesting environment. It focuses on equipping users with the tools and knowledge needed to perform security assessments on Android applications.\n\nThe guide covers installing Android Studio, creating a virtual device using Genymotion or Android Virtual Device Manager (AVD), setting up Burp Suite to intercept network traffic, and configuring the emulator for efficient pentesting.\n\nThe lab includes exercises designed to help users familiarize themselves with common pentesting techniques such as reverse engineering, dynamic analysis, and fuzz testing.\n\nBy following this guide, users can gain practical experience in identifying vulnerabilities in Android applications and improve their skills in mobile application security.\n\n#Android #Pentesting #MobileSecurity #Guide

medium.com/@mscmkn/android-pen

2026-01-07

Có ứng dụng mới chặn người lạ tắt điện thoại từ màn hình khóa! ng dụng này ngăn chặn truy cập vào các tính năng như Chế độ máy bay, Bluetooth, Điểm phát sóng và Menu Nguồn khi điện thoại bị khóa. #ChặnTắtĐiệnThoại #BảoMậtĐiệnThoại #AppMới #Security #MobileSecurity #Lockscreen #Pixel

reddit.com/r/opensource/commen

Appdevconappdevcon
2026-01-07

🔒 Meet our new sponsor: Guardsquare

Trusted by over 975 customers worldwide, Guardsquare helps teams identify risks and defend their apps and SDKs against reverse engineering and tampering, keeping your mobile products secure in an ever-evolving threat landscape.

We’re proud to have Guardsquare on board for Appdevcon 2026. 🚀
Discover more: guardsquare.com

2026-01-07

🚨 62.952 loại mã độc mới tấn công điện thoại di động của người Việt trong năm 2025! Hệ thống nTrust cảnh báo xu hướng tội phạm mạng tập trung vào nền tảng di động, đòi hỏi chúng ta nâng cao cảnh giác và bảo vệ thiết bị ngay hôm nay. 📱🔒 #CyberSecurity #AnNinhMạng #Malware #MãĐộc #MobileSecurity #BảoMậtDiĐộng

vietnamnet.vn/co-toi-62-952-lo

Brian Greenberg :verified:brian_greenberg@infosec.exchange
2026-01-05

Spam calls used to be one of my greatest frustrations 😡 a distraction that interrupts my work, dinner, and focus alike. With iOS 26, Apple introduced Call Screening, a feature that answers unknown calls on your behalf, prompts the caller to identify themselves and explain their reason for calling, and then lets you decide whether to take the call. That simple feature turns nuisance calls into manageable decisions rather than unwanted interruptions. It’s not just about blocking numbers; it’s about knowing who is calling before your phone ever rings. Whether you’re trying to reduce stress, avoid scams, or just keep your attention where it belongs, Call Screening shows how thoughtful design can quietly improve everyday tech. If you don't have this turned on, do it now. You'll thank me.

TL;DR 
🧠 iOS 26 screens unknown calls before they ring
⚡ Callers must state their identity and reason
🎓 You see a transcript and choose to answer
🔍 It gives control back to the user

macworld.com/article/2935514/m

#iOS26 #MobileSecurity #DigitalWellbeing #UserExperience #security #privacy #cloud #infosec #cybersecurity

2026-01-02

Understanding that it's probably nowhere close to as good as the #GoogleTensor chip or #SamsungKnox, has anyone done an analysis of the #HardwareSecurity of the @jolla phone line?

#security #MobileSecurity #JollaPhone #SailfishOS

:awesome:🐦‍🔥nemo™🐦‍⬛ 🇺🇦🍉nemo@mas.to
2025-12-29

Kicksecure's guide reveals mobile phones' hidden dangers: baseband backdoors, relentless data harvesting by Google/Apple, Pegasus spyware, and Wi-Fi/Bluetooth risks. 📱🔒 Harden yours with best practices! #MobileSecurity #PrivacyMatters kicksecure.com/wiki/Mobile_Pho

BiyteLümbiytelum
2025-12-28

Mobile OS choice is now a privacy and governance decision.
Your phone’s OS is not neutral. Apple and stock Android assume background telemetry and ecosystem data flows.
This article breaks down four privacy-focused alternatives (GrapheneOS, LineageOS, CalyxOS, /e/OS), their trade-offs, and real use cases for both personal and business users.
👉 medium.com/@biytelum/your-phon

Since I haven't been getting much in the way of viewpoints, so I'm curious what people might say in the poll. What's your thought on the security implications of jailbreaking your primary iPhone?
#iPhone #Apple #security #infosec #mobileSec #mobileSecurity

BiyteLümbiytelum
2025-12-27

The app store itself is part of your privacy surface.
F-Droid provides a catalog of open source Android apps built from source with clear tracking labels.
Aurora Store is different. It is a Google Play client that lets teams download apps without tying installs to Google accounts.
Different tools. Different risks. Same governance question.

While I feel this article could be be more explicit in places, it seems to be written by a security firm but take a fairly nuanced view of the risks and benefits of #Apple #iPhone jailbreaking. My takeaway would be that it's probably not a great idea for a primary phone; maybe acceptable if it buys you something you need and you're really going to take the time to study up on a keep on top of mitigating #security measures. I'm still interested in other views or references Fedi people might have. #mobileSecurity #mobileSec #infosec

eset.com/blog/en/home-topics/d

An acquaintance is thinking about jailbreaking their iPhone. Not being an Apple user, I haven't followed the topic closely, but I thought this was generally believed to be a bad idea from a security perspective (at least for a primary device).

Unfortunately what I can easily find online are people with no obvious credentials saying it's fine and security companies (who often overblow risks, like the infamous "juicejacking") saying it's bad. I'm hoping the Fediverse might be able to give me a more nuanced or fact-based perspective.

#iphone #security #mobileSecurity #mobileSec

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst