Tag: mobile
-
Google limits Android accessibility API to curb malware abuse
Google is restricting how Android apps can use accessibility features after years of abuse by banking Trojans and mobile malware. The changes, introduced in Android 17.2, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/19/google-android-accessibility-api-restrictions/
-
Moscow seeks to limit internet to state-approved websites amid ongoing outages
Mobile internet in Moscow has been intermittently disrupted since March 6, with some areas still experiencing outages, local reports say. First seen on therecord.media Jump to article: therecord.media/moscow-seeks-to-limit-internet-to-state-approved-sites
-
Android OS-Level Attack Bypasses Mobile Payment Security
Android’s LSPosed-based attack hijacks payment apps via runtime manipulation and SIM-binding bypass First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/android-attack-bypasses-payment/
-
Revealed: How HMRC has been quietly building surveillance capabilities
HMRC has bought phone scanning equipment and analysis software capable of extracting data from mobile devices as it steps up its electronic intelligence gathering capabilities, an investigation by Computer Weekly reveals First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366639490/Revealed-How-HMRC-has-been-quietly-building-surveillance-capabilities
-
Revealed: How HMRC has been quietly building surveillance capabilities
HMRC has bought phone scanning equipment and analysis software capable of extracting data from mobile devices as it steps up its electronic intelligence gathering capabilities, an investigation by Computer Weekly reveals First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366639490/Revealed-How-HMRC-has-been-quietly-building-surveillance-capabilities
-
Lloyds Banking Group Investigates Mobile App Data Exposure Affecting Multiple UK Banks
Lloyds Banking Group has launched an internal investigation after a technical error in its mobile banking applications allowed some customers to briefly see other users’ transaction details. The incident affected the mobile apps of several brands operated by the group, including Lloyds Bank, Halifax, and Bank of Scotland. According to the bank, the issue arose……
-
Privacy Protection Mobile Graphene OS Installation (Part 1)
In today’s world, our smartphones carry more personal information than ever, from private chats and photos to banking details and real-time location data. Protecting First seen on hackingarticles.in Jump to article: www.hackingarticles.in/privacy-protection-mobile-graphene-os-installation-part-1/
-
Privacy Protection Mobile Graphene OS Setup
Before we dive into the setup process, it’s important to understand why GrapheneOS stands out from standard Android and why it’s perfect for privacy-conscious users. First seen on hackingarticles.in Jump to article: www.hackingarticles.in/privacy-protection-mobile-graphene-os-setup/
-
Privacy Protection Mobile Graphene OS Setup
Before we dive into the setup process, it’s important to understand why GrapheneOS stands out from standard Android and why it’s perfect for privacy-conscious users. First seen on hackingarticles.in Jump to article: www.hackingarticles.in/privacy-protection-mobile-graphene-os-setup/
-
Privacy Protection Mobile Graphene OS Setup
Before we dive into the setup process, it’s important to understand why GrapheneOS stands out from standard Android and why it’s perfect for privacy-conscious users. First seen on hackingarticles.in Jump to article: www.hackingarticles.in/privacy-protection-mobile-graphene-os-setup/
-
Privacy Protection Mobile Graphene OS Setup
Before we dive into the setup process, it’s important to understand why GrapheneOS stands out from standard Android and why it’s perfect for privacy-conscious users. First seen on hackingarticles.in Jump to article: www.hackingarticles.in/privacy-protection-mobile-graphene-os-setup/
-
Medical giant Stryker crippled after Iranian hackers remotely wipe computers
Tags: access, attack, authentication, best-practice, ceo, computer, credentials, cyber, cyberattack, data, flaw, group, hacker, identity, infrastructure, intelligence, iran, jobs, mobile, phone, service, software, supply-chain, theft, threat, updateHandala claims credit: The Handala threat group quickly claimed responsibility for the attack. While the group’s involvement is just a claim for now, Stryker employees reportedly saw a version of the Handala logo a cartoon of a Palestinian boy with his back turned and hands crossed behind him on affected devices.Handala’s identity is hard to…
-
North Korean fake IT worker tradecraft exposed
Opportunistic and broadly targeted: These suspect code silos were abused in a variety of illicit projects split between targeting job-seeking programmers and fake IT worker operations.”Based on our visibility, malware operations targeting individual developers seeking employment are most common,” Oliver Smith, senior threat intelligence engineer at GitLab, told CSO. “Threat actors appear to have a…
-
North Korean fake IT worker tradecraft exposed
Opportunistic and broadly targeted: These suspect code silos were abused in a variety of illicit projects split between targeting job-seeking programmers and fake IT worker operations.”Based on our visibility, malware operations targeting individual developers seeking employment are most common,” Oliver Smith, senior threat intelligence engineer at GitLab, told CSO. “Threat actors appear to have a…
-
Trojanized Red Alert App Targets Israeli Users in SMS Scam to Steal Sensitive Data
A mobile spyware campaign abusing a trojanized version of the Red Alert rocket warning Android app to target Israeli users via SMS smishing messages that impersonate official Home Front Command alerts. The fake app keeps full rocket alert functionality so it looks and behaves like the legitimate service while silently exfiltrating sensitive data in the…
-
Microsoft’s March 2026 Patch Tuesday Addresses 83 CVEs (CVE-2026-21262, CVE-2026-26127)
8Critical 75Important 0Moderate 0Low Microsoft addresses 83 CVEs including two vulnerabilities that were publicly disclosed prior to a patch being released. Microsoft patched 83 CVEs in its March 2026 Patch Tuesday release, with eight rated critical and 75 rated as important. Our counts omitted one CVE (CVE-2026-26030) assigned by GitHub. This month’s update includes patches…
-
UK to launch cyber fraud squad in April
The UK’s new Online Crime Centre, launching next month, will bring together government, police, intelligence agencies, banks, mobile networks and tech firms to take coordinated action against cyber fraud. First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366639897/UK-to-launch-cyber-fraud-squad-in-April
-
Challenges and projects for the CISO in 2026
Tags: access, ai, authentication, automation, awareness, cisco, ciso, cloud, communications, control, credentials, cybersecurity, data, defense, detection, edr, email, encryption, endpoint, finance, framework, group, identity, intelligence, leak, mobile, network, service, soc, sophos, strategy, technology, trainingHazel DÃez (Banco Santander), Roberto Lara (Vodafone), Marijus Briedis (NordVPN), Ãlvaro Fernández (Sophos), and Ãngel Ortiz (Cisco). Banco Santander, Vodafone, NordVPN, Sophos y Cisco. Montaje: Foundry Against this backdrop, Cisco defines AI as “the fundamental technology that will set the cybersecurity agenda in 2026,” in the words of Ortiz, who refers to the company’s Integrated…
-
Zero-day exploits hit enterprises faster and harder
Tags: access, apple, attack, backdoor, business, china, cisco, cve, data, detection, endpoint, espionage, exploit, firewall, flaw, fortinet, google, group, hacker, infrastructure, ivanti, least-privilege, mobile, network, oracle, radius, ransomware, risk, router, russia, service, software, technology, threat, update, vpn, vulnerability, zero-dayEnterprise environments under siege: Chinese threat actors continued to display a preference for targets that are difficult to monitor and allow persistent access to strategic networks. Notable examples include the groups that GTIG tracks as UNC5221, which exploited a flaw in Ivanti Connect Secure (CVE-2025-0282) and UNC3886, which exploited a vulnerability in Juniper routers (CVE-2025-21590).Another…
-
Western governments lay the groundwork for secure 6G networks
Governments are preparing for 6G, the next generation of mobile networks, placing security and resilience among their top priorities. In response, seven countries … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/06/global-coalition-telecoms-6g-security-resilience-principles/
-
Google Uncovers 90 Zero-Day Vulnerabilities Under Active Exploitation in 2025
Tags: cyber, cybersecurity, exploit, google, group, intelligence, mobile, software, threat, vulnerability, zero-dayGoogle Threat Intelligence Group (GTIG) reported 90 zero-day vulnerabilities actively exploited in the wild during 2025. While this total is slightly below the 2023 peak, it highlights a critical shift in the cybersecurity landscape, as attackers are increasingly abandoning generic browser exploits to target edge devices, enterprise software, and mobile operating systems.”‹ Shifting Targets and…
-
ThreatLocker CEO On How Zero Trust Expansion Makes It ‘Much Harder’ To Get Hacked
With the expansion of ThreatLocker’s deny-by-default approach to the cloud and mobile announced Thursday, the cybersecurity vendor is addressing one of the biggest challenges faced by MSPs today, CEO Danny Jenkins told CRN. First seen on crn.com Jump to article: www.crn.com/news/security/2026/threatlocker-ceo-on-how-zero-trust-expansion-makes-it-much-harder-to-get-hacked
-
Police do not have to explain to lawyer Fahad Ansari why they seized his phone data, says court
A high court judge has ruled that police do not have to give reasons to lawyer, who acts for Hamas, why they seized his mobile phone data First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366639704/Police-do-not-have-to-explain-to-lawyer-Fahad-Ansari-why-they-seized-his-phone-data-says-court
-
RedAlert Mobile Espionage Campaign Exploits Trojanized Rocket Alert App to Spy on Civilians
A newly discovered mobile espionage operation dubbed “RedAlert” has surfaced amid the ongoing IsraelIran conflict, exploiting wartime fear and dependency on early-warning systems. The campaign targets civilians by distributing a trojanized version of the Israeli Home Front Command’s official Rocket Alert application, aiming to harvest sensitive personal and geolocation data under the guise of legitimate security notifications. Researchers…
-
Zero-day in Android phone chips under active attack
Google and Qualcomm have tag-teamed a serious vulnerability in the chipsets used in Android mobile devices, which has been exploited in the wild as a zero-day First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366639578/Zero-day-in-Android-phone-chips-under-active-attack
-
AI-powered attack kits go open source, and CyberStrikeAI may be just the beginning
100-plus prebuilt tool recipes and a human-readable YAML-based extension system;Attack-chain graph, risk scoring, and “step-by-step replay”;Password-protected web user interfaces (UIs) and audit logs;A knowledge base with vector search, hybrid retrieval, and searchable archives;Vulnerability management with create, read, update, delete (CRUD) operations, severity tracking, status workflow, and statistics;Batch task management that can organize task queues and…
-
Western allies form 6G security coalition amid tech rivalry with China
The Global Coalition on Telecoms (GCOT), comprising the United Kingdom, United States, Canada, Japan and Australia, with Sweden and Finland joining at the launch, unveiled voluntary security and resilience principles for the technology at the Mobile World Congress trade show in Barcelona. First seen on therecord.media Jump to article: therecord.media/western-allies-form-6g-security-coalition
-
Motorola turns to GrapheneOS for smartphone security upgrade
Tags: mobileMotorola is strengthening smartphone security through a long-term partnership with the GrapheneOS Foundation, a mobile security nonprofit that develops a hardened operating … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/02/motorola-grapheneos-foundation-partnership-on-mobile-security/
-
Motorola turns to GrapheneOS for smartphone security upgrade
Tags: mobileMotorola is strengthening smartphone security through a long-term partnership with the GrapheneOS Foundation, a mobile security nonprofit that develops a hardened operating … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/02/motorola-grapheneos-foundation-partnership-on-mobile-security/
-
Motorola turns to GrapheneOS for smartphone security upgrade
Tags: mobileMotorola is strengthening smartphone security through a long-term partnership with the GrapheneOS Foundation, a mobile security nonprofit that develops a hardened operating … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/02/motorola-grapheneos-foundation-partnership-on-mobile-security/

