HackDig : Dig high-quality web security articles for hacker

Trojanized Zoom Apps Target Work-From-Home Android Users

Malicious, re-packaged versions of the Zoom video conferencing application are targeting work-from-home Android users with adware and Trojans, Bitdefender reports.Forced by the current COVID-19 pandemic to work from home, many are using Zoom to stay connected with co-workers and other people they work with, and cybercriminals are taking advantage of the situ
Publish At:2020-04-01 13:41 | Read:166 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Virus & Threats Viru

The Houseparty Hack – Fact or Fiction?

Since the global COVID-19 lockdown started, teens have been flocking to the Houseparty app. Houseparty allows users to create video call sessions so that multiple people can chat at once. At a time when social gatherings are banned, the ability to play games or simply hang out together has been invaluable. Why are people demanding we DELETE HOUSEPARTY? Over
Publish At:2020-03-31 06:25 | Read:107 | Comments:0 | Tags:Mobile News Mobile Security Security hacking houseparty

Vulnerabilities Expose Lexus, Toyota Cars to Hacker Attacks

Vulnerabilities in Lexus and Toyota cars could be exploited by hackers to launch remote attacks against affected vehicles, researchers at China-based Tencent Keen Security Lab discovered.Research into the AVN (Audio, Visual and Navigation) system in the 2017 Lexus NX300 — the same system is also used in other models, including LS and ES series — has revealed
Publish At:2020-03-30 16:09 | Read:159 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Wireless Security Vulner

No Patch for VPN Bypass Flaw Discovered in iOS

Proton Technologies, the company behind the privacy-focused ProtonMail and ProtonVPN services, this week disclosed the existence of a vulnerability in Apple’s iOS mobile operating system that prevents VPN applications from encrypting all traffic.The flaw was discovered by a member of the Proton community in iOS 13.3.1, but Apple has yet to release a patch an
Publish At:2020-03-26 17:19 | Read:299 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Privacy Vulnerabilities

Spyware Delivered to iPhone Users in Hong Kong Via iOS Exploits

A recently observed campaign is attempting to infect the iPhones of users in Hong Kong with an iOS backdoor that allows attackers to take over devices, Trend Micro reports.The attack involved the use of malicious links posted on forums popular in Hong Kong, which led users to real news sites where a hidden iframe would load and run malware. Vulnerabilities a
Publish At:2020-03-26 13:31 | Read:185 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Virus & Threats Viru

ZenKey: How Major Mobile Carriers Are Teaming Up to Eliminate Passwords

ZenKey Links Mobile Phones Directly to Carrier APIs and Avoids Users Having to Use Passwords After Authenticating a PhoneFour major U.S. carriers are developing a new single sign-on variant they believe will do away with the need for passwords. Their solution is new mobile app called ZenKey that securely ties the user's device to the carrier, and t
Publish At:2020-03-24 12:13 | Read:183 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Fraud & Identity The

TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany

IBM X-Force researchers recently analyzed an Android malware app that’s likely being pushed to infected users by the TrickBot Trojan. This app, dubbed “TrickMo” by our team, is designed to bypass strong authentication methods that bank customers use when they need to authorize a transaction. Though it’s not the first of its kind, this
Publish At:2020-03-24 07:55 | Read:209 | Comments:0 | Tags:Advanced Threats Risk Management Threat Intelligence Android

Unified Endpoint Security with VMware & Zimperium

We have said this many times: an endpoint is an endpoint is an endpoint. Today, users perform more than 80% of their daily work on mobile devices. These devices contain or have access to the same information and applications traditional endpoints (laptop, desktop) do.  Unfortunately, they also expose organizations to new threats that must be stopped. With 6
Publish At:2020-03-22 09:38 | Read:216 | Comments:0 | Tags:Mobile Security Mobile security Mobile Threat Protection

7 Spring Cleaning Tasks to Improve Data Security

This year, March 19 ushered in spring in the Northern Hemisphere — the first time since 1896 that the season has started so early. So why not take advantage of the season’s early arrival to do some spring cleaning, not only of your physical space, but of your data and systems, too? Digital spring cleaning can make your life easier and dramatically impr
Publish At:2020-03-20 10:40 | Read:227 | Comments:0 | Tags:Data Protection Mobile Security Application Security Cloud C

Android Surveillance Campaign Leverages COVID-19 Crisis

Amid numerous malicious attacks leveraging the current COVID-19 coronavirus crisis, security researchers have discovered an Android surveillance campaign targeting users in Libya.Ranging from phishing attacks that deliver remote access Trojans or other types of malware to state-sponsored assaults, attacks featuring themes related to the COVID-19 pandemic are
Publish At:2020-03-19 18:25 | Read:204 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Virus & Threats Viru

NIST, DHS Publish Guidance on Securing Virtual Meetings, VPNs

With people worldwide forced to work from home due to the coronavirus epidemic, NIST and DHS published a series of recommendations on how to ensure that virtual meetings and connections to enterprise networks are protected from prying eyes.Conference calls and web meetings have long been part of modern work, as they play a vital role in ensuring the necessar
Publish At:2020-03-19 10:49 | Read:232 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Virus & Threats Iden

Gone (Mobile) Phishing

written and researched by Nicolás Chiaraviglio and Santiago A. Rodriguez CISOs worldwide are scrambling to address phishing attacks. In the second quarter of 2019 alone, there were close to 130 million phishing attacks, taking place on different types of devices within an enterprise – – desktops, laptops and mobile devices. And as unfortunate as
Publish At:2020-03-19 09:34 | Read:324 | Comments:0 | Tags:Mobile Security advanced mobile threat defense Enterprise Mo

A Deeper Dive into Phishing Attacks

written and researched by Nicolás Chiaraviglio and Santiago A. Rodriguez As mentioned in our blogpost on mobile phishing, there are different types of phishing attacks. Here, we’ll dig deeper into the different types that exist. Moreover, we’ll take a look at phishing kits, a tool that allows non-technical scammers to execute successful attacks.  All phishi
Publish At:2020-03-19 09:34 | Read:182 | Comments:0 | Tags:Mobile Security advanced mobile threat defense mobile attack

How We Learned to Stop Worrying and Embrace Remote Work

The industry is in the midst of a transformation. In this case, it isn’t the omnipresent digital transformation but rather a sudden tectonic shift towards remote work. For many organizations built on the classic, communal office space, this can seem daunting. Many employees have started to work from home, and some are throwing a wrench in the machine by conn
Publish At:2020-03-18 13:10 | Read:195 | Comments:0 | Tags:CISO Identity & Access Mobile Security Network BYOD Bring-Yo

'Cookiethief' Android Malware Hijacks Facebook Accounts

A recently discovered Android Trojan was designed to gain root access on infected devices and hijack Facebook accounts by stealing cookies from the browser and the social media app.Referred to as Cookiethief (Trojan-Spy.AndroidOS.Cookiethief), the Trojan features a package name similar to that of the Roblox Android gaming client, although it has nothing in c
Publish At:2020-03-13 10:41 | Read:197 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Virus & Threats Viru


Share high-quality web security related articles with you:)


Tag Cloud