Tag: mobile
-
Privacy Roundup: Week 13 of Year 2025
Tags: access, ai, android, apple, application-security, breach, browser, cctv, chrome, cloud, cve, cybersecurity, data, detection, exploit, firmware, google, group, leak, linux, malware, microsoft, mobile, phishing, privacy, regulation, router, scam, service, software, technology, threat, tool, update, virus, vpn, vulnerability, zero-dayThis is a news item roundup of privacy or privacy-related news items for 23 MAR 2025 – 29 MAR 2025. Information and summaries provided here are as-is for warranty purposes. Note: You may see some traditional “security” content mixed-in here due to the close relationship between online privacy and cybersecurity – many things may overlap;…
-
Apple Fined Euro150 Million by French Regulator Over Discriminatory ATT Consent Practices
Apple has been hit with a fine of Euro150 million ($162 million) by France’s competition watchdog over the implementation of its App Tracking Transparency (ATT) privacy framework.The Autorité de la concurrence said it’s imposing a financial penalty against Apple for abusing its dominant position as a distributor of mobile applications for iOS and iPadOS devices…
-
Cybersecurity Leaders Share Three Challenges Exposure Management Helps Them Solve
Tags: access, attack, automation, best-practice, breach, business, cloud, container, control, cyber, cybersecurity, data, exploit, guide, infrastructure, Internet, microsoft, mobile, network, risk, risk-management, strategy, supply-chain, technology, threat, tool, vulnerability, vulnerability-management, zero-trustEach Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this blog, we share three challenges cybersecurity leaders say exposure management helps them solve. You can read the entire Exposure Management Academy series here. Traditional vulnerability management is undergoing a transformation.…
-
French regulator fines Apple $162 million for anticompetitive use of privacy tool
The French Competition Authority found that Apple exploited its dominance in the mobile app advertising market through a tool that allows iPhone and iPad users to determine when apps can monitor their online activity. First seen on therecord.media Jump to article: therecord.media/french-anticompetitive-fine-ad-tracking
-
‘Sim farms’, high heels, zombie knives: what scammers buy with the money they steal
A haul of items seized by police reveals the scale and threat of payment fraud a crime that can have significant emotional impact on victimsOn a shelf between Alexander McQueen shoes, Louis Vuitton handbags and Versace heels in the police evidence room are an 18-inch machete and a serrated <a href=”https://www.theguardian.com/uk-news/2023/dec/09/google-profiting-from-sale-of-zombie-knives-in-uk-despite-claims-of-ban”>zombie knife. Alongside the expensive…
-
Experts warn of the new sophisticate Crocodilus mobile banking Trojan
The new Android trojan Crocodilus exploits accessibility features to steal banking and crypto credentials, mainly targeting users in Spain and Turkey. ThreatFabric researchers discovered a new Android trojan called Crocodilus, which exploits accessibility features to steal banking and crypto credentials. >>Crocodilus enters the scene not as a simple clone, but as a fully-fledged threat from…
-
How to create an effective crisis communication plan
Tags: access, business, ciso, cloud, communications, corporate, cyber, cyberattack, cybersecurity, data, email, group, incident, incident response, infrastructure, mobile, monitoring, network, phone, risk, strategy, toolA crisis communications plan optimally prepares the company for all possible crisis scenarios. This includes clear rules of conduct and communication, prepared content, and secure communication channels and tools.Internet monitoring shows how the crisis is perceived in social networks and the media. Reputation-damaging publications can be identified early, and countermeasures can be initiated.Good communication in day-to-day business…
-
T-Mobile settles SIM swap lawsuit for $33M
Tags: mobileFirst seen on scworld.com Jump to article: www.scworld.com/brief/t-mobile-settles-sim-swap-lawsuit-for-33m
-
Android financial threats: What businesses need to know to protect themselves and their customers
The rise of mobile banking has changed how businesses and customers interact. It brought about increased convenience and efficiency, but has also opened new doors for … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/28/android-financial-threats/
-
T-Mobile Coughed Up $33 Million in SIM Swap Lawsuit
T-Mobile paid $33 million in a private arbitration process over a SIM swap attack leading to cryptocurrency theft. The post T-Mobile Coughed Up $33 Million in SIM Swap Lawsuit appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/t-mobile-coughed-up-33-million-in-sim-swap-lawsuit/
-
CoffeeLoader: A Brew of Stealthy Techniques
IntroductionZscaler ThreatLabz has identified a new sophisticated malware family that we named CoffeeLoader, which originated around September 2024. The purpose of the malware is to download and execute second-stage payloads while evading detection by endpoint-based security products. The malware uses numerous techniques to bypass security solutions, including a specialized packer that utilizes the GPU, call…
-
‘Lucid’ Phishing-as-a-Service Exploits Faults in iMessage, Android RCS
Cybercriminals in China have figured out how to undermine the strengths of mobile messaging protocols. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/lucid-phishing-exploits-imessage-android-rcs
-
Banking-Malware: 3,6-mal mehr Angriffe auf mobile Nutzer
Cyberkriminelle haben im Jahr 2024 ihre Methoden angepasst und vermehrt mobile Geräte sowie den Kryptowährungssektor ins Visier genommen. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/banking-angriffe-mobile-nutzer
-
New Malware Targets Android Users by Abusing Cross-Platform Framework for Evasion
A recent discovery by the McAfee Mobile Research Team has highlighted a new wave of Android malware campaigns that utilize the .NET MAUI cross-platform framework to evade detection. This framework, introduced by Microsoft as a replacement for Xamarin, allows developers to build applications for multiple platforms, including Android, iOS, Windows, and macOS. However, cybercriminals have…
-
Manipulierte Mobilgeräte bleiben ein hohes Risiko für Unternehmen
Immer häufiger manipulieren Cyberkriminelle mobile Betriebssysteme durch Rooting und Jailbreaking, um tiefgreifend in Nutzerrechte einzugreifen. Besonders brisant ist dabei der Trend zu Mobile-First-Angriffen Smartphones und Tablets rücken zunehmend ins Visier moderner Hackerstrategien. First seen on itsicherheit-online.com Jump to article: www.itsicherheit-online.com/news/security-management/manipulierte-mobilgeraete-bleiben-ein-hohes-risiko-fuer-unternehmen/
-
Cyberattack takes down Ukrainian state railway’s online services
Ukrzaliznytsia, Ukraine’s national railway operator, has been hit by a massive cyberattack that disrupted online services for buying tickets both through mobile apps and the website. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/cyberattack-takes-down-ukrainian-state-railways-online-services/
-
Over 300 arrested in international crackdown on cyber scams
Law enforcement agencies in seven African countries arrested over 300 suspected cybercriminals involved in mobile banking, investment and messaging app scams, according to a statement on Monday by Interpol. First seen on therecord.media Jump to article: therecord.media/300-arrested-africa-crackdown-cyber-scams
-
Rooted, jailbroken mobile devices pose security risk to organizations
First seen on scworld.com Jump to article: www.scworld.com/news/rooted-jailbroken-mobile-devices-pose-security-risk-to-organizations
-
Entwicklungsplattform Firebase unter Feuer
Check Point Software Technologies hat eine Hacker-Kampagne gegen Firebase beobachtet, eine Entwicklungsplattform für mobile sowie Web-Applikationen. Die Sicherheitsforscher von Check Point Research (CPR) stießen auf professionell gestaltete und sehr überzeugend gemachte Fälschungen von echten Internet-Auftritten als Phishing-Websites. Die von CPR beobachtete Kampagne beinhaltete die Nutzung kompromittierter Konten, man spricht dabei auch von Business-E-Mail-Compromise (BEC). Sobald…
-
Catch Me If You Can: Rooting Tools vs The Mobile Security Industry
Our zLabs team dives into why rooting and jailbreaking is a significant threat for enterprises and much more. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/catch-me-if-you-can-rooting-tools-vs-the-mobile-security-industry/
-
Report: More Attacks Aimed at Android Devices Configured with Root Access
A report published today by Zimperium, a provider of a platform for securing mobile devices and applications, today finds devices running the Android operating system that have enabled root-level privileges are 3.5 times more likely to be attacked, resulting in 250 times more cybersecurity incidents. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/report-more-attacks-aimed-at-android-devices-configured-with-root-access/
-
Why rooting and jailbreaking make you a target
As cybercriminals have moved to a mobile-first attack strategy, rooting and jailbreaking mobile devices remain a powerful attack vector. Such mobile devices bypass critical … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/20/rooting-jailbreaking-threat/

