Tag: mobile
-
Apple Introduces RCS EndEnd Encryption for iPhone Messages
by
in SecurityNewsApple has announced the integration of end-to-end encryption (E2EE) for Rich Communication Services (RCS) on iPhones. This development follows the introduction of RCS in iOS 18, marking a new era in mobile messaging with enhanced privacy and security features. The GSMA, a key organizer behind this technology, has released new specifications incorporating E2EE based on…
-
The most notorious and damaging ransomware of all time
by
in SecurityNews
Tags: access, android, attack, backdoor, backup, banking, botnet, breach, communications, computer, control, credentials, cryptography, cyber, cybercrime, dark-web, data, defense, detection, email, encryption, endpoint, exploit, extortion, finance, flaw, framework, germany, google, government, group, hacker, hacking, healthcare, infection, infrastructure, international, jobs, korea, law, lazarus, leak, linux, malicious, malware, microsoft, mobile, msp, network, north-korea, office, open-source, oracle, password, phishing, phone, powershell, ransom, ransomware, russia, service, software, spam, switch, technology, threat, tool, ukraine, update, usa, virus, vulnerability, windowsConti: History: First appearing in May 2020, the Conti RaaS platform is considered the successor to the Ryuk ransomware. As of January 2021, Conti is believed to have infected over 150 organizations and earned millions of dollars for its criminal developers and their affiliates. At least three new versions have been found since its inception.How it works: Conti uses the…
-
Breaking the Barriers to a Password-Free Life in Enterprise: Meet SafeNet eToken Fusion NFC PIV security key
by
in SecurityNews
Tags: access, authentication, cloud, compliance, control, credentials, data, defense, encryption, fido, framework, government, healthcare, identity, infrastructure, mobile, nfc, password, phishing, regulation, service, software, strategy, technology, windowsBreaking the Barriers to a Password-Free Life in Enterprise: Meet SafeNet eToken Fusion NFC PIV security key madhav Thu, 03/13/2025 – 06:46 As large organizations increasingly shift towards passwordless solutions, the benefits are clear: enhanced user experience, improved security, and significant cost savings. The FIDO (Fast Identity Online) standard has emerged as the gold standard…
-
Xitter Hit by Major Cyberattack
by
in SecurityNewsOn March 10, 2025, Xitter experienced major service disruptions throughout the day. Users couldn’t access the platform on both mobile apps and the website. Here’s what happened and why it matters. What Happened? X suffered multiple waves of outages starting early Monday morning: First wave: Around 6:00 AM Eastern Time, affecting about 20,000 users Second……
-
Angreifer setzen beim Phishing zunehmend auf Mobile-First
by
in SecurityNewsVor kurzem ist eine interessante Studie zu Phishing-Angriffen auf mobile Endgeräte, die sogenannten Mishing-Angriffe, erschienen, die Aufmerksamkeit verdient. Immer häufiger kommen in Unternehmen mobile Endgeräte zum Einsatz. Zum Beispiel im Rahmen einer Multi-Faktor-Authentifizierung oder um eine Mobile-First-Anwendung nutzen zu können. Cyberkriminelle machen sich diesen Umstand, so die Studie, immer häufiger zu Nutze, da mobile Endgeräte,…
-
US cities warn of wave of unpaid parking phishing texts
by
in SecurityNewsUS cities are warning of an ongoing mobile phishing campaign pretending to be texts from the city’s parking violation departments about unpaid parking invoices, that if unpaid, will incur an additional $35 fine per day. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/us-cities-warn-of-wave-of-unpaid-parking-phishing-texts/
-
How to Install Librewolf
by
in SecurityNewsWhen configured properly, Mozilla Firefox offers great privacy and security. However, achieving a higher level of privacy and security in Mozilla Firefox requires many tweaks across all levels. Some users may not be too comfortable with this and may prefer an out-of-the-box solution that isn’t Chromium dependent. Enter Librewolf – which aims to be user…
-
Chrome 134, Firefox 136 Patch High-Severity Vulnerabilities
by
in SecurityNewsChrome 134 and Firefox 136 are rolling out across desktop and mobile with patches for multiple high-severity vulnerabilities. The post Chrome 134, Firefox 136 Patch High-Severity Vulnerabilities appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/chrome-134-firefox-136-patch-high-severity-vulnerabilities/
-
Serbian Police Hack Protester’s Phone With Cellebrite Exploit Chain
by
in SecurityNewsAmnesty International said Serbian police used an exploit chain in tandem with legitimate mobile extraction dongle from vendor Cellebrite in an attack that brings up questions around ethical technology development. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/serbian-police-hack-protester-phone-cellebrite-exploit-chain
-
Banking-Trojaner boomen Angriffe haben sich verdreifacht
by
in SecurityNewsMobile Geräte sind bei Cyberkriminellen heiß begehrt. Besonders im Fokus: Online-Banking. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/banking-trojaner-boomen
-
33.3 Million Cyber Attacks Targeted Mobile Devices in 2024 as Threats Surge
Kaspersky’s latest report on mobile malware evolution in 2024 reveals a significant increase in cyber threats targeting mobile devices. The security firm’s products blocked a staggering 33.3 million attacks involving malware, adware, or unwanted mobile software throughout the year. Mobile Malware Landscape Evolves with New Distribution Schemes Adware continued to dominate the mobile threat landscape,…
-
Krass: Handy wird plötzlich als in Russland befindlich angezeigt
by
in SecurityNewsEin Blog-Leser hat mich Ende Februar 2025 per E-Mail kontaktiert, weil er im betrieblichen Umfeld darauf hingewiesen wurde, dass ein T-Mobile Smartphone sich “plötzlich in Russland aufhalte”. Die Information kam angeblich per SMS von T-Mobile. Was steckt dahinter? Wohl eine … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/03/03/krass-handy-wird-ploetzlich-als-in-russland-befindlich-angezeigt/
-
Amnesty Reveals Cellebrite Zero-Day Android Exploit on Serbian Student Activist
by
in SecurityNewsAmnesty International on Friday released technical details on zero-day vulnerabilities exploited by Cellebrite’s mobile forensic tools to spy on a Serbian student activist. The investigation, which builds on a December 2024 report, found evidence that authorities in Serbia used the Cellebrite UFED system to bypass the lock screen on an Android device. The privacy rights…
-
Diese Unternehmen hat es schon erwischt
by
in SecurityNewsLesen Sie, welche Unternehmen in Deutschland aktuell von Cyberangriffen betroffen sind.Sie denken, Ihre Sicherheitsmaßnahmen können Sie langfristig vor Cyberangriffen schützen? Oder dass Ihr Unternehmen zu klein und damit uninteressant für Hacker ist? Egal, ob Sie dem Mittelstand angehören, an der Börse gelistet sind oder zu den kritischen Infrastrukturen gehören: Jedes Unternehmen hat Daten, die Cyberkriminelle…
-
Lawsuit: Amazon Violates Washington State Health Data Law
by
in SecurityNewsExperts Say First Class Action Claim Under State’s Privacy Law Won’t Be the Last. A proposed class action lawsuit alleges that Amazon is unlawfully collecting and tracking mobile users’ data – including sensitive geolocation – in violation of Washington’s My Health My Data Act. It’s the first such lawsuit filed since the data privacy law…
-
Lawsuit: Amazon Violated Washington State Health Data Law
by
in SecurityNewsExperts Say First Class Action Claim Under State’s Privacy Law Won’t Be the Last. A proposed class action lawsuit alleges that Amazon is unlawfully collecting and tracking mobile users’ data – including sensitive geolocation – in violation of Washington State’s My Health My Data Act. It’s the first such lawsuit filed since the data privacy…
-
LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and Mobile
by
in SecurityNewsCybersecurity researchers have flagged an updated version of the LightSpy implant that comes equipped with an expanded set of data collection features to extract information from social media platforms like Facebook and Instagram.LightSpy is the name given to a modular spyware that’s capable of infecting both Windows and Apple systems with an aim to harvest…
-
How Safe Are Online Entertainment Platforms?
by
in SecurityNewsThe shift towards online entertainment services in the US can be explained by the proliferation of mobile devices and improved internet access. It is estimated that more than 97% of the US population currently has online access, with 96% owning smartphones, resulting in the ability for consumers to access the top streaming, gaming, and social…
-
LogonBox VPN 2.4.11 Now Available
by
in SecurityNewsIntroductionLogonBox is pleased to announce the immediate availability of LogonBox VPN 2.4.11.This release includes extra support for TOTP in our own authenticator as well as updated components to address potential security concerns.TOTP additionsThe LogonBox Authenticator now supports failover to using TOTP if the user’s mobile is offline or out of signal range.On the LogonBox web…
-
LogonBox SSPR 2.4.11 Now Available
by
in SecurityNews
Tags: mobileIntroductionLogonBox is pleased to announce the immediate availability of LogonBox SSPR 2.4.11.This release includes extra support for TOTP in our own authenticator as well as updated components to address potential security concerns.TOTP additionsThe LogonBox Authenticator now supports failover to using TOTP if the user’s mobile is offline or out of signal range.On the LogonBox web…
-
Hardware Crypto Wallets vs. Mobile vs. Desktop: Which Should You Choose?
by
in SecurityNewsCrypto wallets are essential in keeping your cryptocurrency safe. There are different types of wallets available and choosing… First seen on hackread.com Jump to article: hackread.com/hardware-crypto-wallets-vs-mobile-vs-desktop/
-
Mobile Phishing Attacks On The Rise
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/brief/mobile-phishing-attacks-on-the-rise
-
What is SIEM? Improving security posture through event log data
by
in SecurityNews
Tags: access, ai, api, automation, ciso, cloud, compliance, data, defense, detection, edr, endpoint, firewall, fortinet, gartner, google, guide, ibm, infrastructure, intelligence, kubernetes, LLM, microsoft, mitigation, mobile, monitoring, network, openai, regulation, risk, router, security-incident, service, siem, soar, soc, software, threat, toolAt its core, a SIEM is designed to parse and analyze various log files, including firewalls, servers, routers and so forth. This means that SIEMs can become the central “nerve center” of a security operations center, driving other monitoring functions to resolve the various daily alerts.Added to this data are various threat intelligence feeds that…
-
Russian cyberespionage groups target Signal users with fake group invites
by
in SecurityNewsQR codes provide a means of phishing Signal users: These features now work by scanning QR codes that contain the cryptographic information needed to exchange keys between different devices in a group or to authorize a new device to an account. The QR codes are actually representations of special links that the Signal application knows…
-
Hackers Converting Stolen Payment Card Data into Apple Google Wallets
by
in SecurityNewsCybercriminal groups, primarily based in China, are leveraging advanced phishing techniques and mobile wallet technologies to convert stolen payment card data into fraudulent Apple and Google Wallet accounts. This innovative approach has revitalized the underground carding industry, which had been weakened in recent years by the adoption of chip-based payment cards in the United States.…
-
Pegasus spyware infections found on several private sector phones
by
in SecurityNewsMobile security company iVerify says that it discovered about a dozen new infections of the powerful Pegasus spyware on phones mostly used by people in private industry. First seen on therecord.media Jump to article: therecord.media/pegasus-spyware-infections-iverify
-
How CISOs can rebuild trust after a security incident
by
in SecurityNews
Tags: attack, breach, business, cisco, ciso, cloud, communications, cybersecurity, data, firewall, group, incident response, jobs, linux, mobile, monitoring, risk, security-incident, service, software, strategy, vulnerabilityMaintaining sensitivity in accountability: Cisco’s Lidz emphasizes that transparency does not end at incident resolution.”Being transparent, internally in particular, by making sure stakeholders understand you and your team have learned from the incident, that there are things you would do better not just in terms of protections, but how you respond and react to incidents”…
-
South Korea Suspends DeepSeek AI Downloads Over Privacy Violations
by
in SecurityNewsSouth Korea has formally suspended new downloads of Chinese artificial intelligence (AI) chatbot DeepSeek in the country until the service makes changes to its mobile apps to comply with data protection regulations.Downloads have been paused as of February 15, 2025, 6:00 p.m. local time, the Personal Information Protection Commission (PIPC) said in a statement. The…