Archive for the ‘Mobile Security’ Category

Mobile app creation: Why data privacy and compliance should be at the forefront

A user’s personal data can be anything from their user name and email address to their telephone name and physical address. Less obvious forms of sensitive data include IP addresses, log data and any information gathered through cookies, as well as users’ biometric data. Any business whose mobile app collects personal information from users is […]

Leave a Comment

T-Mobile Hacker Who Stole Data on 50 Million Customers

Their Security Is Awful’ A 21-year-old American said he used an unprotected router to access millions of customer records in the mobile carrier’s latest breach The hacker who is taking responsibility for breaking into T-Mobile US Inc.’s TMUS -1.63% systems said the wireless company’s lax security eased his path into a cache of records with personal details on more than 50 […]

Leave a Comment

Don’t get tricked by this crashtastic iPhone Wi-Fi hack!

About a month ago, a security researcher revealed what turned out to be zero-day bug in Apple’s Wi-Fi software, apparently without meaning to: Carl Schou, founder of an informal hacker collective known as Secret Club, “created originally as a gag between friends who are passionate about technical subjects”, seems to have been doing what bug-hunters do… […]

Leave a Comment

How to Stay Safe on Mobile Casino Apps

By 2027, the global online casino market is predicted to be worth $127.3 billion, growing at a CAGR of 11.5%. The increase in market size is largely due to the growing popularity of not just smartphones and mobile gaming, but also of social platforms that are transforming online games. Already, providers like Tapinator are developing more social casino […]

Leave a Comment

“Vishing”: An Ever Evolving Persistent Threat to the Public

Last month, my wife was contacted by a phisher, mascaraing as someone from social security. This threat actor made an attempt to obtain her social security number using the threat of fraud investigation to verify her social security number. Because of my background in security, I was able to act quickly to prevent her from […]

Leave a Comment

Securing vehicles from potential cybersecurity threats

Despite thieves regularly finding ways to boost cars by exploiting vulnerabilities in modern keyless locking systems and researchers demonstrating how attackers could fiddle with car settings, the infotainment system, the break system, the steering system, and so on, we’re yet to witness actual safety attacks that resulted in hackers disabling brakes or turning the steering wheel. One of the reasons must surely […]

Leave a Comment

Details on the Unlocking of the San Bernardino Terrorist’s iPhone

The Washington Post has published a long story on the unlocking of the San Bernardino Terrorist’s iPhone 5C in 2016. We all thought it was an Israeli company called Cellebrite. It was actually an Australian company called Azimuth Security. Azimuth specialized in finding significant vulnerabilities. Dowd, a former IBM X-Force researcher whom one peer called “the Mozart of exploit […]

Leave a Comment

Majority of Mobile App Vulnerabilities From Open Source Code

COVID-19 has impacted everything over the past year, and mobile app security is no exception. The Synopsys Cybersecurity Research Center (CyRC) took an in-depth look at application security, and discovered just how vulnerable apps that use open source code really are. According to the report, 98% of apps use open source code, and 63% of those apps […]

Leave a Comment

Developing a Strong Security Posture in the Era of Remote Work

Leave a Comment

How confidential are your calls? This iPhone app shared them with everyone

This isn’t a case of secretive nation-state phone interception methodologies (or spying, as it is often called). It’s not a tale of cybercriminals deliberately trying to listen in to your business discussions so they can divert massive invoice payments or implant ransomware with multi-million dollar blackmail demands. That’s the good news. The bug in this case, discovered by Indian cybersecurity researcher Anand Prakash, […]

Leave a Comment

Digital Security and 5G Security Architecture

Normal day-to-day life was brought to a halt by the COVID-19 pandemic, which greatly impacted the lives of virtually all people worldwide in unprecedented fashion. As people have stayed home and isolated themselves to avoid contracting and spreading the virus, there has been increased reliance on virtual connectivity due to a sharp increase in remote […]

Leave a Comment

Apple starts giving ‘hacker-friendly’ iPhones to top bug hunters

These special ‘research’ iPhones will come with specific, custom-built iOS software with features that ordinary iPhones don’t have. Starting today, the company will start loaning these special research iPhones to skilled and vetted researchers that meet the program’s eligibility. Source: Apple starts giving ‘hacker-friendly’ iPhones to top bug hunters Apple Offering $1 Million Bounty If […]

Leave a Comment

Vulnerability In Xiaomi Electric Scooters Could Allow Remote Attacks

A researcher has discovered a serious vulnerability in Xiaomi electric scooters. Exploiting the flaw could allow remote attacks on it causing sudden breaks. Source: Vulnerability In Xiaomi Electric Scooters Could Allow Remote Attacks IoT Security DISC InfoSec 🔒 securing the business 🔒 Cyber Security Awareness ↑ Grab this Headline Animator

Leave a Comment

Metro Bank is the first bank that disclosed SS7 attacks

Metro Bank has become the first major bank to disclose SS7 attacks against its customers, but experts believe it isn’t an isolated case. Source: Metro Bank is the first bank that disclosed SS7 attacks DISC InfoSec 🔒 securing the business 🔒 Mobile network hacking ↑ Grab this Headline Animator

Leave a Comment

Criminals Are Tapping into the Phone Network Backbone to Empty Bank Accounts

Motherboard has identified a specific UK bank that has fallen victim to so-called SS7 attacks, and sources say the issue is wider than previously reported. Source: Criminals Are Tapping into the Phone Network Backbone to Empty Bank Accounts Mobile Phone Security DISC InfoSec Store

Leave a Comment

Remotely Spying via #FaceTime

Remotely Spying via #FaceTime. FaceTime any iOS 12.1 or later and you can remotely spy on them (audio and video) before they accept incoming call.

Comments (2)

Top 5 excellent Antivirus Protection of 2017

Excellence is achievable but perfection is not. Find an excellent anti-virus product based on your requirements.   Malware are evolving faster than ever, so it’s encourging to discover that the latest generation of antivirus (AV) are better equipped to handle this evolving pace of change. Information security best practice recommends that every PC should run […]

Leave a Comment

Why Two Thirds of Personal Banking Apps Have Vulnerabilities

Personal Banking Apps study has been out,  a security researcher spent about 40 hours testing iPhone and iPad banking applications from the top 60 most influential banks in the world and his findings were totally shocking. 40 of those 60 applications were found to have major mobile security vulnerabilities, which is not something you’d expect […]

Leave a Comment

10 tips to prevent mobile malware

By Vanja Svajcer, SophosLabs How do you prevent it? By taking back control of your devices and their applications. Here are 10 tips for securing your mobile users and preventing mobile malware infections. 1. Inform users about mobile risks A mobile device is a computer and should be protected like one. Users must recognize that applications […]

Leave a Comment

BYOD security measures for mobility

BYOD security controls for mobility These days smart phones certainly add additional risk to Bring Your Own Device (BYOD) to office. Like it or not Bring Your Own Device is a growing trend at all scales and levels. An important thing to understand is that today’s user like and prefer to use their own devices […]

Comments (1)