Mobile News, Articles and Updates

Device makers still shipping products with Android Debug Bridge enabled

Mobile and IoT device manufacturers continue to ship products with the Android Debug Bridge feature automatically enabled -- a dangerous default setting that enables potential adversaries to connect to these devices.

Drastic changes required to protect mobile users against cyber-attacks

Organisational practices and end-user behaviour must both change fast, to deal with rising mobile-focused cyber- attacks, such as phishing, that are now more pervasive than malware.

Mobile users ignore shady app permissions at own risk: NY Cyber Command

Mobile users who download untrustworthy apps on their phone often agree to dangerous permissions requests that give attackers essentially unfettered access to their devices' data and functions.

As mobile voice grows, so do threats to mobile networks

It's critical for service providers to raise awareness regarding the importance of delivering VoIP, whether over mobile or fixed Internet networks, not just cost-efficiently but securely. As connectivity expands, so do the threats.

GDPR is just around the corner: what can organisations expect?

Mobile devices are more vulnerable to data leaks, given that they can be lost or stolen and can often result in lost or deleted data; the legal ramifications for this are the same as with any other device under the GDPR

Why mobile security apps alone won't turn the tide on cyber-threats

Uptake of mobile security apps is low; with mobile operators reporting typical penetration rates are around three to five percent whereas when connectivity providers offer security-as-a-service, uptake rates are up to 40 to 60 percent.

The four key mobile security threats to watch out for in 2018

Exploitation of kernel flaws, more mobile attacks, more rogue nation attacks, and increased use of WiFi 'evil twin' networks predicted for 2018 according to Gary Griffiths.

ADB.Miner takes cryptominer mobile and beyond targeting Android devices

Malicious cryptominers are going mobile and beyond with a new botnet malware targeting Android-based devices that expose debug capabilities to the internet, for the purpose or mining Monero.

Five reasons for extra enterprise data vigilance in 2018

Securing and monitoring a complex and distributed IT infrastructure is essential for growth and regulatory compliance. But it requires cooperation by employees at all levels as well as continuous improvements to meet emerging threats.

PCI DSS 2018: What does the future hold?

The vision is that Card Not Present transactions will be increasingly deflected onto other payment channels, completely bypassing the use of card numbers at the website/call centre.

Skygofree one of the most advanced mobile implants ever says Kaspersky

Described by its discoverers Kaspersky Lab as one of the most advanced mobile implants ever, an implant has been found that has been active since 2014 and is designed for targeted cyber-surveillance.

Is voice biometrics the key to safer authentication?

For voice biometrics to become a cross-industry security standard, there is a greater need for a more advanced and robust solution says Nick Gaubitch.

Countdown to PSD2: Kill passwords to stay alive

Adopt dynamic authentication of customers for each interaction they perform, and do it as seamless and frictionless as possible: use the mobile devices we all carry. Too much is at stake to rely on shared secrets' as safeguards.

Threat group APT-C-23 still active, releases GnatSpy mobile malware

A new mobile malware family, dubbed GnatSpy, that may be a much more dangerous variant of the earlier VAMP malware, has been reported in the wild.

Wireless data tracking case to decide if US citizens have privacy rights

'An individual has no reasonable expectation of privacy in information voluntarily disclosed' is the premise being taken to the US Supreme Court Wednesday, to clarify if law enforcement must obtain warrants to access wireless data

Mobile malware a universal threat around the globe: Check Point

When it comes to avoiding mobile malware no company anywhere on the planet is immune as research shows most companies experienced at least one mobile attack in the last year.

Eavesdropper flaw leaks millions of private conversations

Developers leave API credentials in applications built on Twilio telephony platform allowing phone call eavesdropping.

FBI hasn't cracked Texas shooter's mobile phone

The FBI hasn't yet broken the phone belonging to a gunman who went on a shooting rampage in a Texas church, killing 26 and wounding 24.

Reap benefits of remote working & avoid risks of personal mobile devices

BYOD: Lee Bryant describes how to reap the benefits of remote working without overlooking the risks of personal mobile devices.

Smartphone QR code scanners pose new cyber-threat

Apple iOS 11, Apple has QR scanning functionality enabled by default which Elad Ben-Meir says can effectively make anyone scanning the QR code matrices with Apple devices vulnerable to unknowingly uploading malicious code.

Update: Possibly everyone in Malaysia had their mobile records stolen

It is possible that everyone in Malaysia may have had their mobile phone records stolen and put up for sale on the Dark Web.

T-Mobile API bug may have leaked customer account data

A bug in T-Mobile's API may have allowed attackers to access customer data that can be used to carry out phishing attacks or worse.

Apple denies claims that it lowered iPhone X face-recognition accuracy

Apple is disputing claims that it ordered manufacturers to lower the accuracy of its face-recognition to make the iPhone X easier to make.

Quarter of financial service employee mobile devices unpatched

A quarter of financial service employee mobile devices have unpatched vulnerabilities, according to a recent Symantec report.

4G vulnerabilities put mobile users and even Smart Cities at risk, study

Despite keeping the world constantly connected, 4G networks are still plagued with weaknesses that leave entire mobile networks and future "Smart Cities" open to fraud and other attacks.

Financial attractiveness of ransomware ensures it remains growing threat

Mobile devices under increasing attack from malware, including ransomware, which has seen a 122 percent increase in variants as it becomes an increasingly attractive option for criminals.

21.1 m hit by ExpensiveWall trojan in Google Play, runs up your bill

A malware's been dubbed ExpensiveWall found its way onto Google Play in what has been claimed to have been the second-biggest outbreak to ever hit Google's platform, helping push it to No 2 spot in sources of blacklisted Apps.

Billions of Bluetooth devices vulnerable to MITM attacks; no user action

Billions of Bluetooth devices, including those running on Android, iOS, Linux, and Windows, contain vulnerabilities that can allow malicious actors to remotely execute code, take over devices, and perform (MitM) attacks.

Apple iOS 11 makes it harder for law enforcement to access data

Apple is doubling down on its privacy beliefs with the latest iOS 11 which will reportedly add at least two new features designed to safeguard its owners' privacy.

All pre-8.0 Androids vulnerable to overlay attack; mitigations toasted

A new vulnerability has been discovered affecting older versions of the Google Android Platform.It can be used to easily enable an "overlay attack", tricking the user into unwittingly installing malware onto the device.