September 1, 2022
Via: The RegisterMassive amounts of private data – including more than 300,000 biometric digital fingerprints used by five mobile banking apps – have been put at risk of theft due to hard-coded Amazon Web Services credentials, according to security researchers. Symantec’s Threat […]
September 1, 2022
Via: Help Net SecurityiMobie released AnyUnlock 2.0, a more complete, secure, and instant iPhone password unlocker. It integrates 12 features for users to solve all iOS password issues, like Unlock Screen Passcode, Bypass MDM, Bypass iCloud Activation, Unlock Apple ID, Remove SIM Lock, […]
August 25, 2022
Via: Help Net SecurityDataMotion has launched the DataMotion No-Code Experience for mobile applications and portals. Examining the current market conditions and the related constraints on enterprise and healthcare development teams, they have created a simpler way to access the DataMotion platform. The No-Code […]
August 25, 2022
Via: CSO OnlineThe focus on security for communications service providers (CSPs) has been changing over the last few years. 5G technology has enabled and mandated new business-critical, mission-critical, and security-critical revenue-generating services. However, the benefits of 5G’s higher-speed communications come with corresponding […]
August 16, 2022
Via: Help Net SecurityThe attacker behind the recent Twilio data breach may have accessed phone numbers and SMS registration codes for 1,900 users of the popular secure messaging app Signal. “Among the 1,900 phone numbers, the attacker explicitly searched for three numbers, and […]
Mobile, Mobile security, Threats & Malware, Vulnerabilities
August 16, 2022
Via: Threat PostSmartphone maker Xiaomi, the world’s number three phone maker behind Apple and Samsung, reported it has patched a high-severity flaw in its “trusted environment” used to store payment data that opened some of its handsets to attack. Researchers at Check […]
Cyber-crime, Malware, Mobile, Mobile security
August 15, 2022
Via: The Hacker NewsThe SOVA Android banking trojan is continuing to be actively developed with upgraded capabilities to target no less than 200 mobile applications, including banking apps and crypto exchanges and wallets, up from 90 apps when it started out. That’s according […]
July 14, 2022
Via: CSO OnlineWhen news broke on June 24th that the U.S. Supreme Court had officially reversed Roe v. Wade, declaring that the constitutional right to abortion no longer exists, privacy advocates almost immediately began to ring alarm bells. The right to an […]
June 28, 2022
Via: The Hacker NewsA previously unknown Android banking trojan has been discovered in the wild, targeting users of the Spanish financial services company BBVA. Said to be in its early stages of development, the malware — dubbed Revive by Italian cybersecurity firm Cleafy […]
June 28, 2022
Via: The Hacker NewsYour smartphone is your daily companion. The chances are that most of our activities rely on them, from ordering food to booking medical appointments. However, the threat landscape always reminds us how vulnerable smartphones can be. Consider the recent discovery […]
June 24, 2022
Via: Threat PostGoogle is warning victims in Kazakhstan and Italy that they are being targeted by Hermit, a sophisticated and modular spyware from Italian vendor RCS Labs that not only can steal data but also record and make calls. Researchers from Google […]
June 20, 2022
Via: Security AffairsThe operators behind the BRATA Android malware have implemented more features to make their attacks stealthy. The malware was first spotted in 2019 by security experts at Kaspersky, the name BRAT comes from ‘Brazilian RAT Android,’ because at the time […]
Mobile, Mobile security, Threats & Malware, Vulnerabilities
June 7, 2022
Via: Security WeekThe most severe of the flaws addressed with the June 2022 security updates, Google says, impacts the System component and could lead to remote code execution (RCE). Tracked as CVE-2022-20127, the vulnerability impacts Android versions 10, 11, 12, and 12L. […]
June 1, 2022
Via: Security WeekAlso referred to as Fedex Banker and Cabassous, the spyware has been around since late 2020, mainly focused on users in Europe, but with attacks also registered in the United States, Australia, Japan, New Zealand, and elsewhere. The threat spreads […]
Cyber-crime, Malware, Mobile, Mobile security
May 31, 2022
Via: Threat PostA rapidly evolving IoT malware dubbed “EnemyBot” is targeting content management systems (CMS), web servers and Android devices. Threat actor group “Keksec” is believed behind the distribution of the malware, according to researchers. “Services such as VMware Workspace ONE, Adobe […]
May 31, 2022
Via: The Hacker NewsAn analysis of the mobile threat landscape in 2022 shows that Spain and Turkey are the most targeted countries for malware campaigns, even as a mix of new and existing banking trojans are increasingly targeting Android devices to conduct on-device […]
May 17, 2022
Via: The Hacker NewsMore than 200 Android apps masquerading as fitness, photo editing, and puzzle apps have been observed distributing spyware called Facestealer to siphon user credentials and other valuable information. “Similar to Joker, another piece of mobile malware, Facestealer changes its code […]
May 10, 2022
Via: Security WeekPaz Esteban, the first woman to head Spain’s CNI intelligence agency, will be replaced, Defence Minister Margarita Robles whose ministry oversees the agency, told a news conference in confirming media reports. “Full security does not exist, we have a series […]
May 9, 2022
Via: The Hacker NewsA new set of trojanized apps spread via the Google Play Store has been observed distributing the notorious Joker malware on compromised Android devices. Joker, a repeat offender, refers to a class of harmful apps that are used for billing […]
May 6, 2022
Via: SecurelistBilling fraud is one of the most common sources of income for cybercriminals. There are currently a number of known mobile Trojans specializing in secretly subscribing users to paid services. They usually pay for legitimate services in a user’s name […]