Tag: mobile
-
UK carriers to block spoofed phone numbers in fraud crackdown
Under a new partnership with the government aimed at combating fraud, Britain’s largest mobile carriers have committed to upgrading their networks to eliminate scammers’ ability to spoof phone numbers within a year. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/uk-carriers-to-block-spoofed-phone-numbers-in-fraud-crackdown/
-
Beware: 239 Dangerous Android Apps Found on Google Play with 40M+ Installs
Tags: android, cyber, cybersecurity, google, infrastructure, iot, malicious, marketplace, mobile, threatCybersecurity threats targeting mobile devices and critical infrastructure have reached alarming new heights, according to Zscaler’s latest research. The latest findings from Zscaler, Inc. (NASDAQ: ZS) expose a sophisticated campaign by threat actors who have successfully infiltrated Google’s official app marketplace with hundreds of malicious applications. The company’s ThreatLabz 2025 Mobile, IoT, and OT Threat…
-
Beware: 239 Dangerous Android Apps Found on Google Play with 40M+ Installs
Tags: android, cyber, cybersecurity, google, infrastructure, iot, malicious, marketplace, mobile, threatCybersecurity threats targeting mobile devices and critical infrastructure have reached alarming new heights, according to Zscaler’s latest research. The latest findings from Zscaler, Inc. (NASDAQ: ZS) expose a sophisticated campaign by threat actors who have successfully infiltrated Google’s official app marketplace with hundreds of malicious applications. The company’s ThreatLabz 2025 Mobile, IoT, and OT Threat…
-
Beware: 239 Dangerous Android Apps Found on Google Play with 40M+ Installs
Tags: android, cyber, cybersecurity, google, infrastructure, iot, malicious, marketplace, mobile, threatCybersecurity threats targeting mobile devices and critical infrastructure have reached alarming new heights, according to Zscaler’s latest research. The latest findings from Zscaler, Inc. (NASDAQ: ZS) expose a sophisticated campaign by threat actors who have successfully infiltrated Google’s official app marketplace with hundreds of malicious applications. The company’s ThreatLabz 2025 Mobile, IoT, and OT Threat…
-
Beware: 239 Dangerous Android Apps Found on Google Play with 40M+ Installs
Tags: android, cyber, cybersecurity, google, infrastructure, iot, malicious, marketplace, mobile, threatCybersecurity threats targeting mobile devices and critical infrastructure have reached alarming new heights, according to Zscaler’s latest research. The latest findings from Zscaler, Inc. (NASDAQ: ZS) expose a sophisticated campaign by threat actors who have successfully infiltrated Google’s official app marketplace with hundreds of malicious applications. The company’s ThreatLabz 2025 Mobile, IoT, and OT Threat…
-
Polish loan platform hacked; mobile payment system and other businesses disrupted
As several high-profile companies responded to cyberattacks, Polish Digital Affairs Minister Krzysztof Gawkowski said incidents involving Poland’s public and private infrastructure are becoming “commonplace.” First seen on therecord.media Jump to article: therecord.media/poland-hacks-loan-platform-mobile-payments-system-travel-agency
-
Apple Rolls Out iOS 26.1 and iPadOS 26.1 With Critical Security Fixes
Apple has released a new round of security updates for its mobile platforms, introducing iOS 26.1 and iPadOS 26.1. The latest Apple security updates are available for a wide range of devices. iPhone models beginning with the iPhone 11 and later are supported. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/apple-security-updates-for-ios-and-ipados/
-
Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
A suspected nation-state threat actor has been linked to the distribution of a new malware called Airstalk as part of a likely supply chain attack.Palo Alto Networks Unit 42 said it’s tracking the cluster under the moniker CL-STA-1009, where “CL” stands for cluster and “STA” refers to state-backed motivation.”Airstalk misuses the AirWatch API for mobile…
-
Google Launches New AI Security Features on Android to Block Mobile Scams
Google has announced enhanced artificial intelligence protections designed to combat the rising tide of mobile scams affecting billions of users worldwide. The company revealed that fraudsters stole over $400 billion globally in the past year using advanced AI-powered schemes, making mobile security more critical than ever. Android’s Advanced Defense Against Mobile Fraud Google’s Android platform…
-
Beware of Fake ChatGPT Apps That Spy on Users and Steal Sensitive Data
The proliferation of artificial intelligence applications has created unprecedented opportunities for cybercriminals to exploit user trust through deceptive mobile apps. Mobile app stores today are flooded with hundreds of lookalike applications claiming to offer ChatGPT, DALL·E, and other AI services. Security researchers have discovered that beneath polished logos and promises of advanced functionality lies a…
-
Beware of Fake ChatGPT Apps That Spy on Users and Steal Sensitive Data
The proliferation of artificial intelligence applications has created unprecedented opportunities for cybercriminals to exploit user trust through deceptive mobile apps. Mobile app stores today are flooded with hundreds of lookalike applications claiming to offer ChatGPT, DALL·E, and other AI services. Security researchers have discovered that beneath polished logos and promises of advanced functionality lies a…
-
So schützen Sie Ihr Geld beim Onlinebanking
Sparen findet nicht nur am Bankschalter statt: Viele Menschen nutzen auch Onlinebanking und mobile Banking-Apps, um ihre Finanzen zu verwalten. Etwa jede zehnte Person, die im Vorjahr von Cyberkriminalität betroffen war, erlebte jedoch Betrug beim Onlinebanking (11 %). Wer sein Geld online verwaltet, sollte seine digitale Sicherheit daher genauso ernstnehmen wie die Wahl seiner Bank….…
-
So schützen Sie Ihr Geld beim Onlinebanking
Sparen findet nicht nur am Bankschalter statt: Viele Menschen nutzen auch Onlinebanking und mobile Banking-Apps, um ihre Finanzen zu verwalten. Etwa jede zehnte Person, die im Vorjahr von Cyberkriminalität betroffen war, erlebte jedoch Betrug beim Onlinebanking (11 %). Wer sein Geld online verwaltet, sollte seine digitale Sicherheit daher genauso ernstnehmen wie die Wahl seiner Bank….…
-
NDSS 2025 UI-CTX: Understanding UI Behaviors With Code Contexts For Mobile Applications
SESSION Session 1C: Privacy & Usability 1 Authors, Creators & Presenters: Jiawei Li (Beihang University & National University of Singapore), Jiahao Liu (National University of Singapore), Jian Mao (Beihang University), Jun Zeng (National University of Singapore), Zhenkai Liang (National University of Singapore) PAPER UI-CTX: Understanding UI Behaviors with Code Contexts for Mobile Applications Many mobile…
-
Tips for CISOs switching between industries
Understand and demonstrate achieved results: Making the jump into a new industry isn’t about matching past job titles but about proving you can create impact in a new context. DiMarco says the key is to demonstrate relevance early.”When I pitch a candidate, I explain what they did, how they did it, and what their impact…
-
Hackers Use NFC Relay Malware to Clone TapPay Android Transactions
A new investigation from mobile security firm Zimperium has revealed a fast-growing cybersecurity threat targeting Android users through… First seen on hackread.com Jump to article: hackread.com/nfc-relay-malware-clone-tap-to-pay-android/
-
Airstalk Malware: Multi-Threaded C2 Steals Windows Logins
Tags: attack, communications, control, cyber, cybersecurity, infrastructure, login, malware, mobile, powershell, supply-chain, threat, windowsCybersecurity researchers have uncovered a sophisticated Windows malware family dubbed Airstalk, which leverages legitimate mobile device management infrastructure to establish covert command-and-control communications and exfiltrate sensitive browser credentials. The malware, available in both PowerShell and .NET variants, has been linked with medium confidence to a nation-state threat actor operating through a likely supply chain attack…
-
Airstalk Malware: Multi-Threaded C2 Steals Windows Logins
Tags: attack, communications, control, cyber, cybersecurity, infrastructure, login, malware, mobile, powershell, supply-chain, threat, windowsCybersecurity researchers have uncovered a sophisticated Windows malware family dubbed Airstalk, which leverages legitimate mobile device management infrastructure to establish covert command-and-control communications and exfiltrate sensitive browser credentials. The malware, available in both PowerShell and .NET variants, has been linked with medium confidence to a nation-state threat actor operating through a likely supply chain attack…
-
‘Scamming became the new farming’: inside India’s cybercrime villages
How did an obscure district in a neglected state become India’s byword for digital deceit?On the surface, the town of Jamtara appeared no different from neighbouring districts. But, if you knew where to look, there were startling differences. In the middle of spartan villages were houses of imposing size and unusual opulence. Millions of Indians…
-
What is a Passkey for Mobile Devices?
Explore passkeys for mobile devices: what they are, how they work, their security advantages, and implementation strategies for developers. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/what-is-a-passkey-for-mobile-devices/

