Tag: mobile
-
DuckDuckGo Browser’s Scam Blocker to Guard Against Phishing and Malware Sites
DuckDuckGo has rolled out an advanced update to its browser’s built-in Scam Blocker, a robust security feature designed to shield users from a wide array of online threats, including phishing sites, malware, and sophisticated scams. Now integrated into the DuckDuckGo browser for both desktop and mobile platforms, Scam Blocker offers protection by default, requiring no…
-
Godfather Android trojan uses virtualization to hijack banking and crypto apps
Godfather Android trojan uses virtualization to hijack banking and crypto apps, stealing user funds, warns mobile security firm Zimperium. Zimperium zLabs has uncovered a major evolution of the GodFather Android trojan, which uses on-device virtualization to hijack real banking and crypto apps. Instead of using fake overlays, the malware creates a sandbox on the victim’s…
-
Passkeys on Facebook, Messenger for mobile imminent
First seen on scworld.com Jump to article: www.scworld.com/brief/passkeys-on-facebook-messenger-for-mobile-imminent
-
New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud, and NFC Theft
Cybersecurity researchers have exposed the inner workings of an Android malware called AntiDot that has compromised over 3,775 devices as part of 273 unique campaigns.”Operated by the financially motivated threat actor LARVA-398, AntiDot is actively sold as a Malware-as-a-Service (MaaS) on underground forums and has been linked to a wide range of mobile campaigns,” PRODAFT…
-
Meta To Introduce Full Passkey Support for Facebook on Mobiles
Around half of the world’s top 100 websites have already integrated passkey support First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/meta-introduce-full-passkey-support/
-
GodFather Android Malware Uses On-Device Virtualization to Hijack Legitimate Banking Apps
Zimperium zLabs has uncovered a highly advanced iteration of the GodFather Android banking malware, which employs a groundbreaking on-device virtualization technique to compromise legitimate mobile banking and cryptocurrency applications. Unlike traditional overlay attacks that merely mimic login screens, this malware creates a fully isolated virtual environment on the victim’s device, enabling attackers to monitor and…
-
Godfather Android malware now uses virtualization to hijack banking apps
A new version of the Android malware “Godfather” creates isolated virtual environments on mobile devices to steal account data and transactions from legitimate banking apps. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/godfather-android-malware-now-uses-virtualization-to-hijack-banking-apps/
-
New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft
Cybersecurity researchers have exposed the inner workings of an Android malware called AntiDot that has compromised over 3,775 devices as part of 273 unique campaigns.”Operated by the financially motivated threat actor LARVA-398, AntiDot is actively sold as a Malware-as-a-Service (MaaS) on underground forums and has been linked to a wide range of mobile campaigns,” PRODAFT…
-
From cleaners to creepers: The risk of mobile privilege escalation
In this Help Net Security video, Nico Chiaraviglio, Chief Scientist at Zimperium, explores how Android apps can be abused to escalate privileges, giving attackers access to … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/06/18/android-mobile-privilege-escalation-video/
-
GCHQ Intern Sentenced to 7 Years for Illegally Copying Secret Files to Smartphone
A former intern at the UK’s intelligence agency GCHQ has been sentenced to seven and a half years in prison after admitting to smuggling top secret data out of a secure facility using his mobile phone, in a breach described by prosecutors as a “flagrant violation” of national security protocols. Hasaan Arshad, 25, a computer…
-
Exposure Management Is the Future of Proactive Security
Tags: attack, business, cloud, compliance, corporate, cybersecurity, data, guide, identity, Internet, jobs, mobile, risk, skills, strategy, technology, threat, tool, update, vulnerability, vulnerability-managementEach Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, Jorge Orchilles, Senior Director of Readiness and Proactive Security at Verizon, offers an up-close glimpse at the thinking that drove his move to exposure management. You can read the entire…
-
App Store Security Threats in 2025: Why Hackers Target Mobile Ecosystems
In 2025, app store security threats have reached unprecedented levels, driven by increasingly sophisticated cybercriminal tactics and expanding attack surfaces. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/06/app-store-security-threats-in-2025-why-hackers-target-mobile-ecosystems/
-
Canadian Airline WestJet Suffers Cyberattack, Halts App and Web Services
Calgary-based WestJet Airlines, Canada’s second-largest carrier, is grappling with the fallout from a significant cybersecurity incident that has disrupted access to its mobile app and internal systems. The breach, first detected on June 13, has led to intermittent outages and errors for guests attempting to use WestJet’s digital platforms, including the WestJet app and website.…
-
How to Monetize Unity Apps: Best Practices
Unity is one of the most popular game engines for mobile and cross-platform app development. It powers millions… First seen on hackread.com Jump to article: hackread.com/how-to-monetize-unity-apps-best-practices/
-
Data breach purportedly pilfers over 64M T-Mobile records
First seen on scworld.com Jump to article: www.scworld.com/brief/data-breach-purportedly-pilfers-over-64m-t-mobile-records
-
SHARED INTEL QA: A sharper lens on rising API logic abuse, and a framework to fight back
In today’s digital enterprise, API-driven infrastructure is the connective tissue holding everything together. Related: The DocuSign API-abuse hack From mobile apps to backend workflows, APIs are what keep digital services talking”, and scaling. But this essential layer of connectivity is also… (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/06/shared-intel-qa-a-sharper-lens-on-rising-api-logic-abuse-and-a-framework-to-fight-back/
-
Half of Mobile Users Now Face Daily Scams
Malwarebytes claims 44% of mobile users are exposed to scams every day First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/half-of-mobile-users-now-face/
-
Android Enterprise Rolls Out Security and Productivity Updates
Android Enterprise has introduced features for mobile security, device management and user productivity in its latest update First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/android-enterprise-security-updates/
-
Android Enterprise update puts mobile security first
Google is rolling out new Android Enterprise features aimed at improving mobile security, IT management, and employee productivity. According to Zimperium’s 2025 Global Mobile … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/06/10/android-enterprise-new-features-2025/
-
OpenAI working to fix ChatGPT outage affecting users worldwide
OpenAI is working to fix an ongoing outage impacting ChatGPT users worldwide and preventing them from accessing the chatbot on the web or via mobile and desktop apps. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/technology/openai-working-to-fix-chatgpt-outage-affecting-users-worldwide/
-
OpenAI working to fix ChatGPT outage affecting users worldwide
OpenAI is working to fix an ongoing outage impacting ChatGPT users worldwide and preventing them from accessing the chatbot on the web or via mobile and desktop apps. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/technology/openai-working-to-fix-chatgpt-outage-affecting-users-worldwide/
-
Operation DRAGONCLONE: China Mobile Tietong Hit by Advanced APT Attack
The post Operation DRAGONCLONE: China Mobile Tietong Hit by Advanced APT Attack appeared first on Daily CyberSecurity. First seen on securityonline.info Jump to article: securityonline.info/operation-dragonclone-china-mobile-tietong-hit-by-advanced-apt-attack/
-
How to Use Risk-Based Metrics in an Exposure Management Program
Tags: attack, business, cloud, control, cybersecurity, data, exploit, guide, intelligence, iot, metric, mobile, monitoring, risk, service, threat, tool, update, vulnerability, vulnerability-managementEach Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, Tenable security engineers Arnie Cabral and Jason Schavel share how you can use risk-based metrics. You can read the entire Exposure Management Academy series here. We’re information security engineers at…
-
New Way to Track Covertly Android Users
Researchers have discovered a new way to covertly track Android users. Both Meta and Yandex were using it, but have suddenly stopped now that they have been caught. The details are interesting, and worth reading in detail: >Tracking code that Meta and Russia-based Yandex embed into millions of websites is de-anonymizing visitors by abusing legitimate…
-
Do You Really Need a REAL ID to Fly in the US? Breaking Down the Myths
Join us as we discuss the long-awaited implementation of the REAL ID Act in the U.S. We cover the essentials you need to fly, the potential benefits of using your passport, and how new mobile IDs fit into the TSA’s plans. We also discuss the broader implications for identity surveillance and who truly benefits from……
-
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 48
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Pure Crypter Malware Analysis: 99 Problems but Detection Ain’t One Attacker exploits misconfigured AI tool to run AI-generated payload Crocodilus Mobile Malware: Evolving Fast, Going Global How Threat Actors Exploit Human Trust: A Breakdown of the…
-
Cellebrite Acquires Corellium, Raising Stakes for Mobile Security and Surveillance Tools
First seen on scworld.com Jump to article: www.scworld.com/brief/cellebrite-acquires-corellium-raising-stakes-for-mobile-security-and-surveillance-tools

