Tag: mobile
-
German Mobile Proxy Dein digitaler Tarnmantel von GermanProxy.io
by
in SecurityNews
Tags: mobileGerman Mobile Proxy von GermanProxy.io: Sicher, anonym & ohne Einschränkungen mit echter deutscher IP dein digitaler Tarnmantel fürs Netz. First seen on tarnkappe.info Jump to article: tarnkappe.info/advertorial/german-mobile-proxy-dein-digitaler-tarnmantel-von-germanproxy-io-312735.html
-
Counterfeit Phones Carrying Hidden Revamped Triada Malware
by
in SecurityNewsThe malware, first discovered in 2016, has been updated over the years, and the latest version is now hiding in the firmware of counterfeit mobile phones. First seen on darkreading.com Jump to article: www.darkreading.com/endpoint-security/counterfeit-phones-infected-triada-malware
-
Apple Fined $162 Million by France Authorities for Mobile Ad Market Domination
by
in SecurityNewsFrench antitrust regulators have imposed a hefty fine of Euro150 million ($162.4 million) on tech giant Apple for abusing its dominant position in mobile app advertising through its App Tracking Transparency (ATT) tool. The ruling marks the first fine by regulators globally targeting Apple’s ATT feature, which controls user tracking permissions for third-party apps on…
-
Das gehört in Ihr Security-Toolset
by
in SecurityNews
Tags: access, ai, antivirus, authentication, backup, breach, business, cloud, compliance, control, cyberattack, cybersecurity, data, data-breach, defense, detection, edr, firewall, gartner, governance, iam, identity, incident response, intelligence, iot, malware, mfa, ml, mobile, network, password, ransomware, risk, saas, service, software, spyware, threat, tool, update, vulnerability, vulnerability-managementLesen Sie, welche Werkzeuge essenziell sind, um Unternehmen gegen Cybergefahren abzusichern.Sicherheitsentscheider sind mit einer sich kontinuierlich verändernden Bedrohungslandschaft, einem zunehmend strengeren, regulatorischen Umfeld und immer komplexeren IT-Infrastrukturen konfrontiert. Auch deshalb wird die Qualität ihrer Sicherheits-Toolsets immer wichtiger.Das Problem ist nur, dass die Bandbreite der heute verfügbaren Cybersecurity-Lösungen überwältigend ist. Für zusätzliche Verwirrung sorgen dabei nicht…
-
New Surge of IRS-Themed Attacks Targets Taxpayers’ Mobile Devices
by
in SecurityNewsAs the U.S. tax filing deadline approaches, cybercriminals are intensifying their efforts to exploit taxpayers through a new wave of IRS-themed scams. Research from McAfee Labs has revealed a sharp increase in fraudulent activities targeting mobile devices, with scammers using deceptive text messages and fake IRS websites to steal personal and financial information. Mobile Attacks…
-
Apple fined Euro150 million over App Tracking Transparency issues
by
in SecurityNewsAutorité de la concurrence, France’s antitrust watchdog, has fined Apple Euro150 million ($162 million) for using the App Tracking Transparency privacy framework to abuse its dominant market position in mobile app advertising on its devices. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/apple/apple-fined-150-million-over-app-tracking-transparency-issues/
-
Apple Patches Recent Zero-Days in Older iPhones
Apple has released a hefty round of security updates for its desktop and mobile products, patching two recent zero-days in older iPhone models. The post Apple Patches Recent Zero-Days in Older iPhones appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/apple-patches-recent-zero-days-in-older-iphones/
-
Moscow Metro Digital Outage: Alleged Cyberattack or Technical Failure?
by
in SecurityNewsThe Moscow Metro website and mobile application experienced disruptions on March 31, 2023. The Moscow subway app users reported various malfunctions, including issues loading personal accounts and difficulties in accessing key features like ticket purchasing and account management. The metro website, which is an essential tool for navigating the city’s vast metro system, became unavailable…
-
Privacy Roundup: Week 13 of Year 2025
by
in SecurityNews
Tags: access, ai, android, apple, application-security, breach, browser, cctv, chrome, cloud, cve, cybersecurity, data, detection, exploit, firmware, google, group, leak, linux, malware, microsoft, mobile, phishing, privacy, regulation, router, scam, service, software, technology, threat, tool, update, virus, vpn, vulnerability, zero-dayThis is a news item roundup of privacy or privacy-related news items for 23 MAR 2025 – 29 MAR 2025. Information and summaries provided here are as-is for warranty purposes. Note: You may see some traditional “security” content mixed-in here due to the close relationship between online privacy and cybersecurity – many things may overlap;…
-
Apple Fined Euro150 Million by French Regulator Over Discriminatory ATT Consent Practices
by
in SecurityNewsApple has been hit with a fine of Euro150 million ($162 million) by France’s competition watchdog over the implementation of its App Tracking Transparency (ATT) privacy framework.The Autorité de la concurrence said it’s imposing a financial penalty against Apple for abusing its dominant position as a distributor of mobile applications for iOS and iPadOS devices…
-
Cybersecurity Leaders Share Three Challenges Exposure Management Helps Them Solve
by
in SecurityNews
Tags: access, attack, automation, best-practice, breach, business, cloud, container, control, cyber, cybersecurity, data, exploit, guide, infrastructure, Internet, microsoft, mobile, network, risk, risk-management, strategy, supply-chain, technology, threat, tool, vulnerability, vulnerability-management, zero-trustEach Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this blog, we share three challenges cybersecurity leaders say exposure management helps them solve. You can read the entire Exposure Management Academy series here. Traditional vulnerability management is undergoing a transformation.…
-
French regulator fines Apple $162 million for anticompetitive use of privacy tool
The French Competition Authority found that Apple exploited its dominance in the mobile app advertising market through a tool that allows iPhone and iPad users to determine when apps can monitor their online activity. First seen on therecord.media Jump to article: therecord.media/french-anticompetitive-fine-ad-tracking
-
‘Sim farms’, high heels, zombie knives: what scammers buy with the money they steal
A haul of items seized by police reveals the scale and threat of payment fraud a crime that can have significant emotional impact on victimsOn a shelf between Alexander McQueen shoes, Louis Vuitton handbags and Versace heels in the police evidence room are an 18-inch machete and a serrated <a href=”https://www.theguardian.com/uk-news/2023/dec/09/google-profiting-from-sale-of-zombie-knives-in-uk-despite-claims-of-ban”>zombie knife. Alongside the expensive…
-
‘Sim farms’, high heels, zombie knives: what scammers buy with the money they steal
A haul of items seized by police reveals the scale and threat of payment fraud a crime that can have significant emotional impact on victimsOn a shelf between Alexander McQueen shoes, Louis Vuitton handbags and Versace heels in the police evidence room are an 18-inch machete and a serrated <a href=”https://www.theguardian.com/uk-news/2023/dec/09/google-profiting-from-sale-of-zombie-knives-in-uk-despite-claims-of-ban”>zombie knife. Alongside the expensive…
-
Experts warn of the new sophisticate Crocodilus mobile banking Trojan
by
in SecurityNewsThe new Android trojan Crocodilus exploits accessibility features to steal banking and crypto credentials, mainly targeting users in Spain and Turkey. ThreatFabric researchers discovered a new Android trojan called Crocodilus, which exploits accessibility features to steal banking and crypto credentials. >>Crocodilus enters the scene not as a simple clone, but as a fully-fledged threat from…
-
T-Mobile settles SIM swap lawsuit for $33M
by
in SecurityNews
Tags: mobileFirst seen on scworld.com Jump to article: www.scworld.com/brief/t-mobile-settles-sim-swap-lawsuit-for-33m
-
Android financial threats: What businesses need to know to protect themselves and their customers
The rise of mobile banking has changed how businesses and customers interact. It brought about increased convenience and efficiency, but has also opened new doors for … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/28/android-financial-threats/
-
How to create an effective crisis communication plan
by
in SecurityNews
Tags: access, business, ciso, cloud, communications, corporate, cyber, cyberattack, cybersecurity, data, email, group, incident, incident response, infrastructure, mobile, monitoring, network, phone, risk, strategy, toolA crisis communications plan optimally prepares the company for all possible crisis scenarios. This includes clear rules of conduct and communication, prepared content, and secure communication channels and tools.Internet monitoring shows how the crisis is perceived in social networks and the media. Reputation-damaging publications can be identified early, and countermeasures can be initiated.Good communication in day-to-day business…
-
T-Mobile Coughed Up $33 Million in SIM Swap Lawsuit
by
in SecurityNewsT-Mobile paid $33 million in a private arbitration process over a SIM swap attack leading to cryptocurrency theft. The post T-Mobile Coughed Up $33 Million in SIM Swap Lawsuit appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/t-mobile-coughed-up-33-million-in-sim-swap-lawsuit/
-
T-Mobile Coughed Up $33 Million in SIM Swap Lawsuit
by
in SecurityNewsT-Mobile paid $33 million in a private arbitration process over a SIM swap attack leading to cryptocurrency theft. The post T-Mobile Coughed Up $33 Million in SIM Swap Lawsuit appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/t-mobile-coughed-up-33-million-in-sim-swap-lawsuit/
-
T-Mobile Coughed Up $33 Million in SIM Swap Lawsuit
by
in SecurityNewsT-Mobile paid $33 million in a private arbitration process over a SIM swap attack leading to cryptocurrency theft. The post T-Mobile Coughed Up $33 Million in SIM Swap Lawsuit appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/t-mobile-coughed-up-33-million-in-sim-swap-lawsuit/
-
CoffeeLoader: A Brew of Stealthy Techniques
by
in SecurityNewsIntroductionZscaler ThreatLabz has identified a new sophisticated malware family that we named CoffeeLoader, which originated around September 2024. The purpose of the malware is to download and execute second-stage payloads while evading detection by endpoint-based security products. The malware uses numerous techniques to bypass security solutions, including a specialized packer that utilizes the GPU, call…
-
‘Lucid’ Phishing-as-a-Service Exploits Faults in iMessage, Android RCS
by
in SecurityNewsCybercriminals in China have figured out how to undermine the strengths of mobile messaging protocols. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/lucid-phishing-exploits-imessage-android-rcs
-
Banking-Malware: 3,6-mal mehr Angriffe auf mobile Nutzer
by
in SecurityNewsCyberkriminelle haben im Jahr 2024 ihre Methoden angepasst und vermehrt mobile Geräte sowie den Kryptowährungssektor ins Visier genommen. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/banking-angriffe-mobile-nutzer
-
New Malware Targets Android Users by Abusing Cross-Platform Framework for Evasion
by
in SecurityNewsA recent discovery by the McAfee Mobile Research Team has highlighted a new wave of Android malware campaigns that utilize the .NET MAUI cross-platform framework to evade detection. This framework, introduced by Microsoft as a replacement for Xamarin, allows developers to build applications for multiple platforms, including Android, iOS, Windows, and macOS. However, cybercriminals have…
-
Manipulierte Mobilgeräte bleiben ein hohes Risiko für Unternehmen
by
in SecurityNewsImmer häufiger manipulieren Cyberkriminelle mobile Betriebssysteme durch Rooting und Jailbreaking, um tiefgreifend in Nutzerrechte einzugreifen. Besonders brisant ist dabei der Trend zu Mobile-First-Angriffen Smartphones und Tablets rücken zunehmend ins Visier moderner Hackerstrategien. First seen on itsicherheit-online.com Jump to article: www.itsicherheit-online.com/news/security-management/manipulierte-mobilgeraete-bleiben-ein-hohes-risiko-fuer-unternehmen/