#mobile-security

[ follow ]
#phishing
Ars Technica
3 hours ago
Information security

Ever wonder how crooks get the credentials to unlock stolen phones?

Law enforcement shut down a phishing platform facilitating the unlocking of over 1.2 million stolen phones, highlighting significant cybersecurity threats. [ more ]
The Hacker News
4 weeks ago
Information security

Czech Mobile Users Targeted in New Banking Credential Theft Scheme

A new phishing campaign in the Czech Republic uses Progressive Web Applications to steal banking credentials from mobile users. [ more ]
Ars Technica
3 hours ago
Information security

Ever wonder how crooks get the credentials to unlock stolen phones?

Law enforcement shut down a phishing platform facilitating the unlocking of over 1.2 million stolen phones, highlighting significant cybersecurity threats. [ more ]
The Hacker News
4 weeks ago
Information security

Czech Mobile Users Targeted in New Banking Credential Theft Scheme

A new phishing campaign in the Czech Republic uses Progressive Web Applications to steal banking credentials from mobile users. [ more ]
morephishing
#nsa
ZDNET
7 hours ago
Privacy professionals

The NSA advises you to turn off your phone once a week - here's why

Protecting your smartphone from security threats requires simple actions like regular restarts and maintaining app updates. [ more ]
ZDNET
3 weeks ago
Privacy professionals

Why the NSA advises you to turn off your phone once a week

Regularly rebooting your smartphone can enhance security against hackers.
Avoiding unofficial app stores and suspicious links is essential for user safety.
Keep your device updated with the latest security patches to counter threats. [ more ]
ZDNET
7 hours ago
Privacy professionals

The NSA advises you to turn off your phone once a week - here's why

Protecting your smartphone from security threats requires simple actions like regular restarts and maintaining app updates. [ more ]
ZDNET
3 weeks ago
Privacy professionals

Why the NSA advises you to turn off your phone once a week

Regularly rebooting your smartphone can enhance security against hackers.
Avoiding unofficial app stores and suspicious links is essential for user safety.
Keep your device updated with the latest security patches to counter threats. [ more ]
morensa
TNW | Deep-Tech
1 day ago
European startups

Germany picks 4 startups to deliver world's first quantum computer for 'mobile defence'

Germany's Cyber Agency is developing the first portable quantum computer for mobile security by 2027. Four startups are involved in this €35 million initiative. [ more ]
#privacy
Engadget
3 weeks ago
Digital life

How to use a VPN on your iPhone

Using a VPN on your iPhone enhances privacy and security while allowing access to global content, but choosing a reliable service is crucial. [ more ]
Developer Tech News
1 month ago
Information security

Apple, the EU, and the threat of sideloaded applications

Apple's iOS 17.04 update allows sideloading apps and third-party app stores to comply with EU's Digital Markets Act, impacting mobile security and privacy measures. [ more ]
Engadget
3 weeks ago
Digital life

How to use a VPN on your iPhone

Using a VPN on your iPhone enhances privacy and security while allowing access to global content, but choosing a reliable service is crucial. [ more ]
Developer Tech News
1 month ago
Information security

Apple, the EU, and the threat of sideloaded applications

Apple's iOS 17.04 update allows sideloading apps and third-party app stores to comply with EU's Digital Markets Act, impacting mobile security and privacy measures. [ more ]
moreprivacy
#cybersecurity
Engadget
1 month ago
Information security

Researchers claim most Google Pixel phones shipped with exploitable bloatware since 2017

A serious vulnerability exists in Google Pixel smartphones related to the Showcase.apk software, which enables remote access risks. [ more ]
The Verge
1 month ago
Information security

Google Pixel phones sold with security vulnerability, report finds

Google Pixel phones had software enabling surveillance and remote control, compromising user security and trust.
The security vulnerability could lead to severe data breaches and trusted companies are reacting decisively to mitigate risks. [ more ]
Engadget
1 month ago
Information security

Researchers claim most Google Pixel phones shipped with exploitable bloatware since 2017

A serious vulnerability exists in Google Pixel smartphones related to the Showcase.apk software, which enables remote access risks. [ more ]
The Verge
1 month ago
Information security

Google Pixel phones sold with security vulnerability, report finds

Google Pixel phones had software enabling surveillance and remote control, compromising user security and trust.
The security vulnerability could lead to severe data breaches and trusted companies are reacting decisively to mitigate risks. [ more ]
morecybersecurity
Securitymagazine
1 month ago
Privacy professionals

Security leaders respond to a sophisticated SMS stealing campaign

Sophisticated SMS Stealer campaign discovered by Zimperium, with over 105,000 samples, posing risks of OTP interception, credential theft, and financial fraud. [ more ]
ComputerWeekly.com
1 month ago
Information security

Enhancing mobile app security with behaviour-based biometrics | Computer Weekly

Behaviour-based biometrics analyze unique user patterns for robust security. [ more ]
Securitymagazine
2 months ago
Privacy professionals

Security leaders respond to the AT&T data breach

AT&T data compromised, no content, or personal info leaked
Organizations urged to enhance mobile security measures [ more ]
TechRepublic
8 months ago
Information security

5 Best VPNs for Android in 2024

Virtual private networks (VPNs) are essential for securing mobile connections on Android devices.
Finding trusted VPNs on the Google Play Store can be challenging due to the multitude of options. [ more ]
#facial-recognition
TechRepublic
1 year ago
Information security

How to secure your iOS device to prevent unwanted access

Leaving your iOS device unattended can pose a security risk as more iOS users are carrying personal information on their devices.Keep it secure with these handy tips.You might not think about it, but securing your iOS device can help protect your personal information if you lose your device or leave it unattended.
ComputerWeekly.com
1 year ago
Privacy professionals

How to protect against SMS mobile security weakness

This code will also be prompted when the phone is restarted and needs to reconnect with your phone network provider.That phone will take the phone number of the previous phone.You may well now be thinking that someone's biometrics (fingerprint or facial recognition) or phone PIN number will prevent a malicious actor from getting access to their text messages.Before heading to your activity, you lock your valuables away in a locker, meaning your phone and wallet are together.Indeed, security hardening measures on a user's devices usually focus on making sure the software running on the phone is up to date and free of any malware that could steal data.
TechRepublic
1 year ago
Information security

How to secure your iOS device to prevent unwanted access

Leaving your iOS device unattended can pose a security risk as more iOS users are carrying personal information on their devices.Keep it secure with these handy tips.You might not think about it, but securing your iOS device can help protect your personal information if you lose your device or leave it unattended.
ComputerWeekly.com
1 year ago
Privacy professionals

How to protect against SMS mobile security weakness

This code will also be prompted when the phone is restarted and needs to reconnect with your phone network provider.That phone will take the phone number of the previous phone.You may well now be thinking that someone's biometrics (fingerprint or facial recognition) or phone PIN number will prevent a malicious actor from getting access to their text messages.Before heading to your activity, you lock your valuables away in a locker, meaning your phone and wallet are together.Indeed, security hardening measures on a user's devices usually focus on making sure the software running on the phone is up to date and free of any malware that could steal data.
morefacial-recognition
Alleywatch
2 months ago
Information security

iVerify Raises $12M to Protect Mobile Devices from the Growing Number of Threats

Safeguarding mobile devices from cyber threats is crucial in today's digital age, with the rise of remote work and connectivity. [ more ]
[ Load more ]