Tag: mobile
-
AI Helps Security Teams, But Boosts Threats
Industrial control systems, application containers, and mobile devices are the top contenders on this year’s list of the most difficult assets to secu… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/04/ai-helps-security-teams-but-boosts-threats/
-
LightSpy Hackers Indian Apple Device Users to Steal Sensitive Data
The revival of the LightSpy malware campaign has been observed, focusing on Indian Apple device users. This sophisticated mobile spyware, suspected to… First seen on gbhackers.com Jump to article: gbhackers.com/lightspy-hackers-steal/
-
Malicious Apps Caught Secretly Turning Android Phones into Proxies for Cybercriminals
Several malicious Android apps that turn mobile devices running the operating system into residential proxies (RESIPs) for other threat actors have be… First seen on thehackernews.com Jump to article: thehackernews.com/2024/04/malicious-apps-caught-secretly-turning.html
-
GSMA releases Mobile Threat Intelligence Framework
GSM Association’s Fraud and Security Group (FASG) has published the first version of a framework for describing, in a structured way, how adversaries … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/04/10/gsma-mobile-threat-intelligence-framework/
-
Targus Cyberattack Confirmed: Operations Frozen, Investigations Continues
Targus, renowned for its mobile gadget and bag manufacturing, recently reported a cyberattack, compelling the organization to announce a temporary sus… First seen on thecyberexpress.com Jump to article: thecyberexpress.com/targus-cyberattack-confirmed/
-
Keeper Security integriert Passkey-Unterstützung für mobile Geräte
Keeper Security, ein führender Anbieter von Zero-Trust- und Zero-Knowledge-Lösungen zum Schutz von Anmeldedaten, privilegiertem Zugang und Remote-Verb… First seen on netzpalaver.de Jump to article: netzpalaver.de/2024/04/02/keeper-security-integriert-passkey-unterstuetzung-fuer-mobile-geraete/
-
Mobiles Bezahlen: Google Wallet erfordert künftig immer Entsperrung
First seen on golem.de Jump to article: www.golem.de/news/mobiles-bezahlen-google-wallet-erfordert-kuenftig-immer-entsperrung-2403-183569.html
-
Google Fixes Two Pixel Zero-Days Exploited by Forensic Firms
Bugs Allowed Device Unlocking and Memory Access. Google addressed two zero-day vulnerabilities in Pixel mobile phones that forensic firms exploited to… First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/google-fixes-two-pixel-zero-days-exploited-by-forensic-firms-a-24785
-
Post-ChatGPT, Vishing, Smishing, Phishing Attacks Surge by 1,265%
The rise of generative AI has ushered in a new wave of cyber threats, particularly in the realm of mobile communication. Recent findings from Enea, a … First seen on sensorstechforum.com Jump to article: sensorstechforum.com/post-chatgpt-phishing-attacks-surge/
-
What Are Mobile VPN Apps and Why You Should Be Using Them
When you think of virtual private networks, chances are pretty good your thoughts go to the tried and true VPNs of old, which made it possible for you… First seen on techrepublic.com Jump to article: www.techrepublic.com/resource-library/downloads/what-are-mobile-vpn-apps-and-why-you-should-be-using-them/
-
Digital Banking ” At Risk! A Needed Defense Update
Over 12 years ago, I came across this new online security solution that let me look at my entire set of web and mobile transactions in real time, as t… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/03/digital-banking-at-risk-a-needed-defense-update/
-
Discovering API secrets endpoints using APKLeaks
Learn how to improve your recon process with the use of apkleaks to find hidden API servers, secrets, and endpoints embedded in mobile apps. The post … First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/03/discovering-api-secrets-endpoints-using-apkleaks/
-
Navigating Certificate Lifecycle Management (CLM) and Mobile Device Management (MDM) With an Effective PKI Solution
Tags: mobileWith the acceleration of digital transformation and hybrid work, the number of devices and machines… The post acceleration of digital transformatio… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/03/navigating-certificate-lifecycle-management-clm-and-mobile-device-management-mdm-with-an-effective-pki-solution/
-
Apple im Unternehmen: Fühlen sich Mac- und iPhone-User zu sicher?
Malware und Angriffe gibt es natürlich auch auf Apple-Geräten. Eine Untersuchung des Mobile-Device-Management-Anbieters Jamf warnt vor zu viel Naivitä… First seen on heise.de Jump to article: www.heise.de/news/Apple-im-Unternehmen-Fuehlen-sich-Mac-und-iPhone-User-zu-sicher-9645362.html
-
Equipment Reassignment Checklist (Free Download)
The reassignment of existing equipment takes place when employees leave the organization or receive new computers, mobile devices, printers and other … First seen on techrepublic.com Jump to article: www.techrepublic.com/resource-library/toolstemplates/equipment-reassignment-checklist-free-download/
-
MobSF: Open-source security research platform for mobile apps
The Mobile Security Framework (MobSF) is an open-source research platform for mobile application security, encompassing Android, iOS, and Windows Mobi… First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/03/14/mobsf-open-source-mobile-security-framework/
-
Equipment Reassignment Checklist
The reassignment of existing equipment takes place when employees leave the organization or receive new computers, mobile devices, printers and other … First seen on techrepublic.com Jump to article: www.techrepublic.com/resource-library/toolstemplates/equipment-reassignment-checklist/
-
What is Business Logic Abuse?
Business logic abuse is a common attack technique directed at web and mobile applications as well as their APIs. These attacks appear as valid interac… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/03/what-is-business-logic-abuse/
-
Meet the Female Engineers Behind Kasada’s Mobile Bot Defense
Liz Mills and Mira Kim are two trailblazing women at Kasada shaping cybersecurity. Discover their journey into tech, impactful projects, and sage advi… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/03/meet-the-female-engineers-behind-kasadas-mobile-bot-defense/
-
Nur zwei Prozent aller eingesetzten Drucker gelten als sicher – Studie: Industrielle und mobile Drucker sind ein Sicherheitsrisiko
Tags: mobileFirst seen on security-insider.de Jump to article: www.security-insider.de/studie-industrielle-und-mobile-drucker-sind-ein-sicherheitsrisiko-a-7db494181e9c405b9247c3c64e20820b/
-
Predator Spyware Targeted Mobile Phones in New Countries
First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/predator-spyware-targeted-new/
-
Stealthy GTPDOOR Linux malware targets mobile operator networks
Security researcher HaxRob discovered a previously unknown Linux backdoor named GTPDOOR, designed for covert operations within mobile carrier networks… First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/stealthy-gtpdoor-linux-malware-targets-mobile-operator-networks/
-
Deepfakes Malware Attacks: GoldFactory’s Advanced Tactics
In the ever-evolving landscape of mobile Deepfakes malware attacks, a notorious threat actor named GoldFactory has surfaced, leaving a trail of highly… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/03/deepfakes-malware-attacks-goldfactorys-advanced-tactics/
-
5 Benefits of Identity and Access Management
As remote work extends its footprint through technologies like virtual private networks (VPNs), virtual desktops, and mobile devices, the ease of acce… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/02/5-benefits-of-identity-and-access-management/
-
How to Handle Mobile App Secrets
Learn why storing secrets in mobile apps is a major security risk, how to manage user and developer secrets properly, and why client-side secrecy is i… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/02/how-to-handle-mobile-app-secrets/
-
Massive AT&T outage impacts US mobile subscribers
Tens of thousands of U.S. customers from Verizon, T-Mobile, and AT&T have been complaining about lack of wireless service or interruptions on Thursday… First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/mobile/massive-atandt-outage-impacts-us-mobile-subscribers/
-
NSO Group Adds ‘MMS Fingerprinting’ Zero-Click Attack to Spyware Arsenal
The purveyor of the infamous Pegasus mobile spyware now has a new method for obtaining critical information from target iPhones and other mobile devic… First seen on darkreading.com Jump to article: www.darkreading.com/application-security/nso-group-adds-mms-fingerprinting-zero-click-attack-spyware-arsenal
-
First Ever iOS Trojan Steals Facial Recognition Data
A novel, very sophisticated mobile Trojan dubbed GoldPickaxe.iOS that targets iOS users exclusively was discovered to collect facial recognition data,… First seen on gbhackers.com Jump to article: gbhackers.com/ios-trojan-facial-recognition/
-
200,000 Facebook Marketplace user records leaked on hacking forum
A threat actor leaked 200,000 records on a hacker forum, claiming they contained the mobile phone numbers, email addresses, and other personal informa… First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/200-000-facebook-marketplace-user-records-leaked-on-hacking-forum/
-
SEC bitcoin hack was result of SIM-swapping
A cyber attack on the US financial regulator earlier in January 2024 occurred after hackers took over one of its mobile phone accounts in a so-called … First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366567197/SEC-Bitcoin-hack-was-result-of-SIM-swapping

