Tag: mobile
-
Black Hat Fireside Chat: Consumers demand secure mobile apps; it’s high time for brands to deliver
Two-plus decades of enduring wave after wave of mobile app malware and fraud has finally taken its toll on users. Now comes a global survey from Appdo… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/08/black-hat-fireside-chat-consumers-demand-secure-mobile-apps-its-high-time-for-brands-to-deliver/
-
Ukraine Hackers Hit Major Russian banks with DDoS attacks
Several prominent Russian bank clients experienced issues with their mobile apps and websites. According to Downdetector, complaints began to surge ar… First seen on gbhackers.com Jump to article: gbhackers.com/russian-banks-with-ddos-attacks/
-
MSSP Market News: Cyvatar, Zimperium Partner for Mobile Threat Defense
First seen on scmagazine.com Jump to article: www.scmagazine.com/news/mssp-market-news-cyvatar-zimperium-partner-for-mobile-threat-defense
-
GUEST ESSAY: Consumers, institutions continue to shoulder burden for making mobile banking secure
The rapid adoption of mobile banking has revolutionized how we manage our finances. Related: Deepfakes aimed at mobile banking apps … First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/07/guest-essay-consumers-institutions-continue-to-shoulder-burden-for-making-mobile-banking-secure/
-
Report Identifies More Than 250 Evil Twin Mobile Applications
The Satori Threat Intelligence Team funded by HUMAN Security, a provider of a platform thwarting bot-based attacks, today disclosed it has uncovered a… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/07/report-identifies-more-than-250-evil-twin-mobile-applications/
-
Massive AT&T data breach exposes call logs of 109 million customers
AT&T is warning of a massive data breach where threat actors stole the call logs for approximately 109 million customers, or nearly all of its mobile … First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/massive-atandt-data-breach-exposes-call-logs-of-109-million-customers/
-
AppViewX Integration with Intune for Certificate Automation
Microsoft Intune is a cloud-based Mobile device management (MDM) solution that helps organizations manage devices, including mobile devices, tablets, … First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/07/appviewx-integration-with-intune-for-certificate-automation/
-
7 Top Mobile Security Threats: Safeguard Your Device
First seen on scmagazine.com Jump to article: www.scmagazine.com/native/7-top-mobile-security-threats-safeguard-your-device
-
Breach Roundup: Microsoft Patches Zero-Day Active Since 2023
Also: Europol Decries Mobile Encryption; FBCS Breach Victim Count Grows. This week, Microsoft and Adobe released patches, Europol pushed back against … First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/breach-roundup-microsoft-patches-zero-day-active-since-2023-a-25750
-
Europol Says Mobile Roaming Tech Is Making Its Job Too Hard
First seen on packetstormsecurity.com Jump to article: packetstormsecurity.com/news/view/36073/Europol-Says-Mobile-Roaming-Tech-Is-Making-Its-Job-Too-Hard.html
-
Operation Celestial Force employs mobile and desktop malware to target Indian entities
Cisco Talos is disclosing a new malware campaign called Operation Celestial Force running since at least 2018. It is still active today, employing the… First seen on blog.talosintelligence.com Jump to article: blog.talosintelligence.com/cosmic-leopard/
-
Europol says Home Routing mobile encryption feature aids criminals
Europol is proposing solutions to avoid challenges posed by privacy-enhancing technologies in Home Routing that hinder law enforcement’s ability to in… First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/europol-says-home-routing-mobile-encryption-feature-aids-criminals/
-
Infostealing malware masquerading as generative AI tools
Over the past six months, there has been a notable surge in Android financial threats malware targeting victims’ mobile banking funds, whether in the … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/07/05/infostealing-malware-generative-ai/
-
Mobile Political Spam Surges Threefold For 2024 Election
First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/political-spam-surges-threefold/
-
USENIX Security ’23 Notice the Imposter! A Study on User Tag Spoofing Attack in Mobile Apps
Authors/Presenters:Shuai Li, Zhemin Yang, Guangliang Yang, Hange Zhang, Nan Hua, Yurui Huang, and Min Yang Many thanks to USENIX for publishing their … First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/07/usenix-security-23-notice-the-imposter-a-study-on-user-tag-spoofing-attack-in-mobile-apps/
-
USENIX Security ’23 Eye-Shield: Real-Time Protection of Mobile Device Screen Information from Shoulder Surfing
Tags: mobileAuthors/Presenters:Brian Jay Tang, Kang G. Shin Many thanks to Presenters:Brian Jay Tang, Kang G. Shin Many thanks to Presenters:Brian… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/07/usenix-security-23-eye-shield-real-time-protection-of-mobile-device-screen-information-from-shoulder-surfing/
-
How Mobile ID Verification is Shaping the Future of Digital Payments
Tags: mobileFirst seen on securityboulevard.com Jump to article: securityboulevard.com/2024/07/how-mobile-id-verification-is-shaping-the-future-of-digital-payments/
-
What is Crowdsourced Penetration Testing: Benefits,Risks,Comparisons
Organisations of all sizes rely heavily on new technology such as cloud, mobile, web applications, and APIs, making them prime targets for cyberattack… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/06/what-is-crowdsourced-penetration-testing-benefitsriskscomparisons/
-
Singapore Police Extradites Malaysians Linked to Android Malware Fraud
The Singapore Police Force (SPF) has announced the extradition of two men from Malaysia for their alleged involvement in a mobile malware campaign tar… First seen on thehackernews.com Jump to article: thehackernews.com/2024/06/singapore-police-extradites-malaysians.html
-
High-Risk Overflow Bug in Intel Chips Likely Impacts 100s of PC Models
The old, but newly disclosed, vulnerability is buried deep inside personal computers, servers, and mobile devices, and their supply chains, making rem… First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/high-risk-overflow-bug-in-intel-chips-likely-impacts-100s-of-pc-models
-
Zero-Day Exploits Cheat Sheet: Definition, Examples How It Works
Zero-day exploits use unknown vulnerabilities to infiltrate PCs, networks, mobile phones and IoT devices. For unprepared security teams, these exploit… First seen on techrepublic.com Jump to article: www.techrepublic.com/article/zero-day-exploits-the-smart-persons-guide/
-
The Rising Threat of Mobile Phishing and How to Avoid It
First seen on scmagazine.com Jump to article: www.scmagazine.com/native/the-rising-threat-of-mobile-phishing-and-how-to-avoid-it
-
EU Opens the App Store Gates: A Call to Arms for MDM Implementation
By introducing a mobile device management (MDM) platform into the existing infrastructure, administrators gain the ability to restrict sideloading on … First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/06/eu-opens-the-app-store-gates-a-call-to-arms-for-mdm-implementation/
-
Neuer Jira-Exploit? Angeblich Apple- und TDaten im Darknet aufgetaucht
First seen on heise.de Jump to article: www.heise.de/news/Cybercrime-Datenlecks-bei-Apple-und-T-Mobile-Geruechte-ueber-Jira-Exploit-9771149.html
-
Arid Viper Launches Mobile Espionage Campaign with AridSpy Malware
The threat actor known as Arid Viper has been attributed to a mobile espionage campaign that leverages trojanized Android apps to deliver a spyware st… First seen on thehackernews.com Jump to article: thehackernews.com/2024/06/arid-viper-launches-mobile-espionage.html
-
Vollintegrierte Lösung für VS-NfD-Arbeitsplätze – Genua bündelt Lösungen für VS-NfD-konformes mobiles Arbeiten
Tags: mobileFirst seen on security-insider.de Jump to article: www.security-insider.de/genua-buendelt-loesungen-fuer-vs-nfd-konformes-mobiles-arbeiten-a-d87d9609082ca6cebfe900702d3b7d87/
-
T-Mobile refutes IntelBroker hacking claims
First seen on scmagazine.com Jump to article: www.scmagazine.com/brief/t-mobile-refutes-intelbroker-hacking-claims
-
T-Mobile denies it was hacked, links leaked data to vendor breach
T-Mobile has denied it was breached or that source code was stolen after a threat actor claimed to be selling stolen data from the telecommunications … First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/t-mobile-denies-it-was-hacked-links-leaked-data-to-vendor-breach/
-
Neuer Jira-Exploit? Apple- und TDaten im Untergrund aufgetaucht
Ein bekannter Cyberkrimineller versucht interne Daten aus Apples und T-Mobiles Beständen sowie Schadcode für Jira zu Geld zu machen. Ein Unternehmen d… First seen on heise.de Jump to article: www.heise.de/news/Cybercrime-Datenlecks-bei-Apple-und-T-Mobile-Geruechte-ueber-Jira-Exploit-9771149.html

