October 25, 2023
Via: TechRadarCybersecurity researchers from Kaspersky have revealed more details on TriangleDB, a piece of malware that targeted a zero-day vulnerability recently discovered in the iOS operating system. In a detailed technical writeup, Kaspersky said the malware contains at least four different […]
August 16, 2023
Via: Naked SecurityThe US Federal Bureau of Investigation (FBI) has just published an official public service announcement headlined with with a very specific warning: Cybercriminals Targeting Victims through Mobile Beta-Testing Applications. The Feds didn’t go as far as naming any specific vendors […]
July 7, 2022
Via: Dark ReadingA cryptocurrency wallet service provider serving more than 2 million users worldwide and managing about $3 billion worth of Bitcoin was found to contain API vulnerabilities tied to how external authentication logins were implemented. The bugs are fixed, but the […]
February 2, 2022
Via: Tech RadarMicrosoft has revealed it enterprise endpoint security antivirus offering also now provides threat and vulnerability management for Android and iOS. The move means that Microsoft Defender for Endpoint now works with all major platforms for workstations, servers, as well as […]
July 2, 2021
Via: Help Net SecurityThere’s a major gap in security capability among mobile operators, which in many cases is not yet being filled by industry partnerships, Trend Micro reveals. In the 5G era, and a rapidly changing digital landscape, operators could broaden their security […]
April 26, 2021
Via: Security IntelligenceHome IoT device adoption has grown by leaps and bounds. It’s a time of connected gadgets everywhere, and with them, comes security risks. McKinsey predicts the total number of IoT-connected devices will be 43 billion by 2023, with the vast […]
March 1, 2021
Via: CSO OnlineMobile security is at the top of every company’s worry list these days — and for good reason: Nearly all workers now routinely access corporate data from smartphones, a trend that’s grown even more prominent thanks to the ongoing global […]
February 26, 2021
Via: Security WeekContact tracing applications have been created to help authorities automate the process of identifying those who have been in close contact with infected individuals. Using a newly developed tool called COVIDGuardian, which was designed for both static and dynamic program […]
February 12, 2021
Via: Security IntelligenceIf you or your employees access protected information with authentication codes sent to a cell phone, you might want to rethink your plan. Two-factor authentication (2FA) using text messages can fall prey to phone authentication scams. That’s not to say […]
Mobile, Network security, Privacy protection, Security
September 4, 2020
Via: Help Net SecurityThere are clear benefits of 5G SIM capabilities to protect the most prominent personal data involved in mobile communications, according to the Trusted Connectivity Alliance. Addressing privacy risks The IMSI, known as a Subscription Permanent Identifier (SUPI) in 5G, is […]
April 2, 2020
Via: Naked SecurityThe US Federal Communications Commission (FCC) on Tuesday unanimously passed new rules that require wireless carriers to implement a technology framework – by June 2021 – to filter out robocalls. This one’s been kicking around for years: it’s called STIR/SHAKEN. […]
Threats & Malware, Vulnerabilities
March 4, 2020
Via: Security AffairsGoogle’s March 2020 security updates for Android include the fix for a critical vulnerability, tracked as CVE-2020-0032, that affects the media framework as part of the 2020-03-01 security patch level. The 2020-03-01 security patch level fixed 11 vulnerabilities in framework, […]
Mobile, Mobile security, Threats & Malware, Vulnerabilities
February 7, 2020
Via: Security WeekA total of 25 vulnerabilities were fixed with Android’s February 2020 security updates, and the most important of them are two critical severity issues is System. One of these is CVE-2020-0022, a bug impacting the Bluetooth component, and which can […]
January 31, 2020
Via: Help Net SecurityEU Member States have identified risks and vulnerabilities at national level and published a joint EU risk assessment. Through the toolbox, the Member States are committing to move forward in a joint manner based on an objective assessment of identified […]
January 13, 2020
Via: Hot for SecurityU.S. members of Congress have called on the Federal Communications Commission (FCC) to crack down on SIM swapping, a type of fraud blamed for more than $70 million in nationwide losses annually. The letter sent to the FCC advocates for […]
January 7, 2020
Via: Help Net SecurityA new report from Juniper Research found that facial recognition hardware, such as Face ID on recent iPhones, will be the fastest growing form of smartphone biometric hardware. This means it will reach over 800 million in 2024, compared to […]
Cloud security, Mobile security
December 6, 2019
Via: Threat PostNames, addresses, phone numbers, call and text message records and account PINs were all caught up in a cloud misconfiguration. Hundreds of thousands of mobile phone bills for AT&T, Verizon and T-Mobile subscribers have been laid open to anyone with […]
December 3, 2019
Via: Help Net SecurityHackers are actively exploiting StrandHogg, a newly revealed Android vulnerability, to steal users’ mobile banking credentials and empty their accounts, a Norwegian app security company has warned. “Promon identified the StrandHogg vulnerability after it was informed by an Eastern European […]
November 25, 2019
Via: Hot for SecurityHackers have once again successfully compromised the website of Chinese phone manufacturer OnePlus. Back in January 2018, it was revealed that the credit card details of some 40,000 people using the OnePlus website had been stolen by hackers. On that […]
October 30, 2019
Via: Threat PostResearchers are on the hunt for the infection vector behind a mysterious mobile malware that has infected over 45,000 Android devices in the past six months. Researchers said they have detected a surge in detections of the malware, dubbed Xhelper, […]