61% of Global Organizations Suffered a Mobile Breach in the Last 12 Months
As the modern workforce has evolved, so has the technology that is relied upon. There is no doubt that the era of mobile is here to stay, from hybrid employees to cloud data access, leaving global enterprises vulnerable to cyber risks. The 2022 Verizon Mobile Security Index (MSI) repo
If you’re the parent of a tween or teen, chances are they’re not the only ones going back to school. Their smartphones are going back too.
Our recent global research showed just how many tweens and teens use a smartphone. Plenty. Depending on the age band, that figure ranges anywhere from 76% to 93%, with some noteworthy variations between countries.
One of
Malware is malicious code that threat actors use to compromise data collected, stored, processed, or transmitted by mobile devices, computers, servers, or any other internet-connected device or application. As part of an organization’s security and data protection program, it should have a plan in place that, at minimum, mitigates risk to systems and network
An Israeli government investigation into the use of powerful eavesdropping technology by the police found that they only used it after securing a judicial warrant but that the flood of information exceeded the limits of their authority.The probe was launched after Calcalist, a local business daily, published an explosive report that the police had used Pegas
Apple’s AirTag has proven to be an excellent option for keeping track of items prompt to get stolen or lost. A whole list of people with lost pieces of luggage managed to reunite with their belongings thanks to Apple’s tracking products. AirTags help find keys and anything else people may want to follow, such as pets. However, recent events have
For years, healthcare has been going through a digital transformation, and in many organizations, the pandemic has radically accelerated this trend. Today, mobile devices play an increasingly central role in how patients access and experience healthcare services and how healthcare organizations manage operations and service delivery.
We’re now well into an e
A security audit by the European Parliament has unearthed attempts to plant high-end surveillance software on the phone of a Greek lawmaker and there are fresh reports linking the hack attempt to a known North Macedonia spyware vendor.The company, called Cytrox, was previously exposed as the makers of Predator, a tool capable of launching sophisticated explo
Instagram has recently rolled out a collection of new parental control features for users in the UK. Addressing concerns about the potentially negative mental health effects of the social network, these new tools are expected to help parents better help keep their teenagers safe online.
So what has changed?
New daily time limits
One of the biggest concerns p
An analysis of the evolution of cybercrime from its beginnings in the 1990s to its billion-dollar presence today has one overriding theme: the development of cybercrime as a business closely mimics the evolution of legitimate business, and will continue to evolve to improve its own ROI.In the early days, hacking was more about personal prestige and kudos tha
Google this week announced the rollout of DNS-over-HTTP/3 (DoH3) for Android 11 and newer devices.An encrypted DNS protocol, DoH3 is expected to provide performance and safety improvements compared to alternatives, mainly through the QUIC transport layer network protocol.By default, even for encrypted connections, DNS lookups are not private – the base DNS p
A Chinese threat actor named Roaming Mantis has been targeting Android users in France with the MoqHao malware in a new smishing campaign, security researchers with Sekoia warn.The campaign uses phishing SMS messages containing an embedded malicious link to trick unsuspecting victims into downloading malware on their Android devices, or into accessing a phis
Cybersecurity researchers reported details Monday of cases where Thai activists involved in the country’s pro-democracy protests had their cell phones or other devices infected and attacked with government-sponsored spyware.Investigators of the internet watchdog groups Citizen Lab, Thailand’s Internet Law Reform Dialogue, or iLaw, and Digital Reach said at l
The European Central Bank said Tuesday that its president, Christine Lagarde, was targeted in a hacking attempt but no information was compromised.The attempt took place “recently,” the Frankfurt-based central bank for the 19 countries that use the euro said in an emailed response to a query about a report by Business Insider. The bank added that “it was ide
Microsoft has issued an urgent Patch Tuesday bulletin to warn of in-the-wild zero-day exploitation of a privilege escalation flaw in the Windows operating system.The critical vulnerability, flagged as CVE-2022-22047, exists in the Client/Server Runtime Subsystem (csrss.exe) and carries a CVSS severity rating of 7.8."An attacker who successfully exploited thi
News Analysis: Cybersecurity experts toss bouquets at Apple for removing attack surface from its flagship platforms and call on competing OS makers to match Cupertino’s attempts to neutralize the mercenary spyware business.Apple’s decision to architect a new operating system ‘Lockdown Mode’ to counteract the mercenary spyware exploitation business is receivi
Announce
Share high-quality web security related articles with you:)