Zscaler Report: Mobile, IoT, and OT Cyber Threats Surge in 2024

Zscaler Report: Mobile, IoT, and OT Cyber Threats Surge in 2024

A new report from cloud security company Zscaler sheds light on the growing mobile threats on Android operating systems, as well as IoT and OT devices threats. The findings come as more than 60% of the global Internet traffic is now generated by mobile devices and financially-oriented mobile threats have grown by 111% over the last year. A list of mobile malware threats Zscaler’s ThreatLabz witnessed a 29% rise in banking mobile malware over the…

Read More

Criminals Use Malware to Steal Near Field Communication Data

Criminals Use Malware to Steal Near Field Communication Data

Recent research by cybersecurity company ESET provides details about a new attack campaign targeting Android smartphone users. The cyberattack, based on both a complex social engineering scheme and the use of a new Android malware, is capable of stealing users’ near field communication data to withdraw cash from NFC-enabled ATMs. Constant technical improvements from the threat actor As noted by ESET, the threat actor initially exploited progressive web app technology, which enables the installation of…

Read More

StormBamboo Compromises ISP to Spread Malware via Updates

StormBamboo Compromises ISP to Spread Malware via Updates

New research from cybersecurity company Volexity revealed details about a highly sophisticated attack deployed by a Chinese-speaking cyberespionage threat actor named StormBamboo. StormBamboo compromised an ISP to modify some DNS answers to queries from systems requesting legitimate software updates. Multiple software vendors were targeted. The altered responses led to malicious payloads served by StormBamboo in addition to the legitimate update files. The payloads targeted both macOS and Microsoft Windows operating systems. Who is StormBamboo? StormBamboo…

Read More

What Should I do If My Phone Gets Stolen or Lost? | McAfee Blog

What Should I do If My Phone Gets Stolen or Lost? | McAfee Blog

Before your phone gets lost or stolen, put some basic steps in place. You’ll want to act quickly, so preparation is everything. With the right measures, you can find it, recover it, or even erase it if needed. These steps can get you set up so you can do exactly that. Ways to protect your smartphone from loss or theft Lock your phone. Locking your phone is one of the most basic smartphone security measures…

Read More

How Does Jailbreaking Or Rooting Affect My Mobile Device Security? | McAfee Blog

How Does Jailbreaking Or Rooting Affect My Mobile Device Security? | McAfee Blog

In today’s interconnected world, our mobile devices serve as essential tools for communication, productivity, and entertainment. However, for some tech-savvy users, the allure of unlocking the full potential of their devices through jailbreaking (for iOS) or rooting (for Android) can be tempting. While these processes offer users greater control and customization over their devices, they also raise significant questions about security implications.  What is jailbreaking?  To “jailbreak” means to allow the phone’s owner to gain…

Read More

How to Protect Yourself from Vishing | McAfee Blog

How to Protect Yourself from Vishing | McAfee Blog

“Vishing” occurs when criminals cold-call victims and attempt to persuade them to divulge personal information over the phone. These scammers are generally after credit card numbers and personal identifying information, which can then be used to commit financial theft. Vishing can occur both on your landline phone or via your cell phone. The term is a combination of “voice,” and “phishing,” which is the use of spoofed emails to trick targets into clicking malicious links….

Read More

Apple Operating Systems are Being Targeted by Threat Actors, Report Finds

Apple Operating Systems are Being Targeted by Threat Actors, Report Finds

The number of macOS vulnerabilities exploited in 2023 increased by more than 30%, according to a new report. The Software Vulnerability Ratings Report 2024 from patch management software company Action1 also found that Microsoft Office programs are becoming more exploitable, while attackers are targeting load balancers like NGINX and Citrix at a record rate. Action1 analysts used data from the National Vulnerability Database and CVEdetails.com to draw five insights into how the threat landscape changed…

Read More

5 Best Password Managers for Android in 2024

5 Best Password Managers for Android in 2024

According to Statista, Android accounted for 70.1% of the world’s mobile operating systems in the fourth quarter of 2023. That’s an overwhelming amount of devices — and in turn, a massive amount of passwords and accounts on each device. While you can still use sticky notes to keep track of passwords, writing them down isn’t a secure way to manage your sensitive credentials. This is where password managers come in. Password managers encrypt and organize…

Read More

5 Best VPNs for Android in 2024

5 Best VPNs for Android in 2024

As more Android users rely on their smartphones to surf the web, virtual private networks have become essential tools to help secure your mobile connection, no matter where you are. One big advantage of the Android ecosystem is the sheer number of VPN apps you can download from the Play Store. While it’s nice to have tons of options, it can be hard to find trusted VPNs that are worth your time and money. In…

Read More

ESET Threat Report: ChatGPT Name Abuses, Lumma Stealer Malware Increases, Android SpinOk SDK Spyware's Prevalence

ESET Threat Report: ChatGPT Name Abuses, Lumma Stealer Malware Increases, Android SpinOk SDK Spyware's Prevalence

Risk mitigation tips are provided for each of these cybersecurity threats. Cybersecurity company ESET released its H2 2023 threat report, and we’re highlighting three particularly interesting topics in it: the abuse of the ChatGPT name by cybercriminals, the rise of the Lumma Stealer malware and the Android SpinOk SDK spyware. Jump to: ChatGPT name is being abused by cybercriminals In the second half of 2023, ESET has blocked 650,000 attempts to access malicious domains whose…

Read More
1 2