Cloud security, Malware, Mobile, Mobile security, Phishing
October 25, 2019
Via: Threat PostCyber threats like targeted ransomware, mobile malware and sophisticated phishing attacks will escalate in 2020, researchers warn. However, defenses like artificial intelligence (AI), cyber insurance and faster security response will also increase, helping defend companies against imminent threats, according to […]
October 17, 2019
Via: James HughesIt’s undeniable that Apple’s iPad has become the go-to tablet for both home users and professionals. According to IDC, as of Q2 2019, Apple made up 38.1 percent of the global tablet market and saw increased growth over the same quarter of the […]
Application security, Security
October 16, 2019
Via: Help Net SecurityIn Q2 2019, RSA Security identified 57,406 total fraud attacks worldwide. Of these, phishing attacks were the most prevalent (37%), followed by fake mobile apps (usually apps posing as those of popular brands). But while phishing went up by just […]
Malware, Mobile security, Vulnerabilities
September 27, 2019
Via: Threat PostWhen it comes to the next generation of mobile networks, 5G promises a more Internet of Things-friendly ecosystem with vast improvements over the current capabilities of 4G – however, its intersection with IoT will also raise the stakes on cybersecurity. […]
Mobile security, Vulnerabilities
September 27, 2019
Via: Security WeekEarlier this month, cyber telecoms security firm AdaptiveMobile Security disclosed the details of Simjacker, an attack method that involves sending specially crafted SMS messages to the targeted mobile phone. The attack relies on the fact that these special messages are […]
August 30, 2019
Via: Help Net SecurityWith the advent of cloud services and the proliferation of high-end mobile devices (think iOS devices and Android phones), the workforce is moving inexorably to a mobile one where managers and employees are no longer tied to the office. What […]
August 29, 2019
Via: Threat PostThe TrickBot malware, known previously for targeting U.S. banks, is now setting a bullseye on users of U.S.-based mobile carriers, including Verizon Wireless, T-Mobile and Sprint, to launch SIM swapping attacks. Researchers with Dell’s Secureworks research team warned that they […]
July 23, 2019
Via: CSO OnlineMobile security is at the top of every company’s worry list these days — and for good reason: Nearly all workers now routinely access corporate data from smartphones, and that means keeping sensitive info out of the wrong hands is […]
July 22, 2019
Via: Security IntelligenceAccording to IDC, Google Android is expected to capture 86.7 percent of the worldwide operating system market by the end of 2019, continuing to show growth from the already eye-popping 85.1 percent reported last year. The popularity of Android lends […]
July 18, 2019
Via: Help Net SecurityThe privacy panic over FaceApp, the selfie-editing mobile app that makes photo subjects younger, older or turns them into members of the opposite sex, has been overblown. The (overblown) issue FaceApp is an iOS and Android app developed by Russian […]
Cyber-crime, Mobile security, Phishing
July 11, 2019
Via: Help Net SecurityFinancial services organizations are increasingly exposed to cyber threats, according to Wandera. The report “Mobile Security in the Financial Services,” includes analysis of six months of security data from 225 financial services customers with 50,000 devices collectively under management. Notable […]
June 12, 2019
Via: Threat PostA sophisticated cyberattack is targeting Gmail users through fraudulent, unsolicited Google Calendar notifications. The campaign takes advantage of a common default feature for people using Gmail on their smartphone: Calendar invites automatically pop up on phones, prompting users to accept […]
May 24, 2019
Via: Help Net SecurityWith GDPR reaching its one year anniversary May 25, Airship revealed top-level results of its global benchmark study, examining the state of mobile app user permissions across nearly 700 million people worldwide. Meet new regulatory requirements While marketers trimmed customer […]
Mobile, Mobile security, Privacy protection
May 23, 2019
Via: Security WeekResearchers at Cambridge University have determined that attackers could use the built-in motion sensors in mobile devices to generate a unique device fingerprint. Device fingerprinting has been in use for many years. It is the creation of a unique identifier, […]
Mobile, Mobile security, Network security
May 10, 2019
Via: Security AffairsSecurity researchers at vpnMentor discovered an unprotected database containing information belonging to Freedom Mobile customers. Freedom Mobile is the fourth largest mobile network operator in Canada. The unprotected database stored at least 5 million records associated with 1.5 million users […]
Mobile security, Network security, Security
May 8, 2019
Via: Help Net SecurityMobile service providers anticipate significant new revenue opportunities from the coming deployment of high-speed 5G networks and a host of new IoT-driven use cases, but they also believe much-improved security will be essential to realizing that potential. A new global […]
April 16, 2019
Via: Security IntelligenceWhere does “it” end? We can probably all agree that securing and protecting the devices that communicate with our networks is a fair definition of endpoint security. Similarly, these devices are one of the best places to start when figuring […]
April 8, 2019
Via: TechRadarGCHQ has suggested that mobile operators could be banned from using Huawei equipment in and around Westminster due to concerns about the company’s software engineering practices. All four major UK operators use Huawei’s radio equipment in their networks, but its […]
Application security, Mobile security, Vulnerabilities
April 5, 2019
Via: Threat PostPreinstalled apps on mobile phones can be just as annoying as crapware found on new PCs. Now a report from security experts at Check Point Research suggest those preinstalled mobile apps may be more than just annoying – they can […]
Application security, Mobile security, Vulnerabilities
April 2, 2019
Via: Threat PostA white hat hacker reverse engineered 30 mobile financial applications and found sensitive data buried in the underlying code of nearly all apps examined. With this information a hacker could, for example, recover application programming interface (API) keys and use […]