Articles

In our previous stories, you might have already read about various campaigns warning how threat actors are capitalizing on the ongoing coronavirus pandemic in an attempt to infect your computers and mobile devices with malware or scam you out of your money. Unfortunately, to some extent, it’s working, and that’s because the attack surface is changing and expanding rapidly as many
Source de l’article sur The Hacker News

A newly discovered watering-hole campaign is targeting Apple iPhone users in Hong Kong by using malicious website links as a lure to install spyware on the devices. According to research published by Trend Micro and Kaspersky, the « Operation Poisoned News » attack leverages a remote iOS exploit chain to deploy a feature-rich implant called ‘LightSpy’ through links to local news websites, which
Source de l’article sur The Hacker News

Europol, along with the Spanish and the Romanian national police, has arrested 26 individuals in connection with the theft of over €3.5 million ($3.9 million) by hijacking people’s phone numbers via SIM swapping attacks. The law enforcement agencies arrested 12 and 14 people in Spain and Romania, respectively, as part of a joint operation against two different groups of SIM swappers, Europol
Source de l’article sur The Hacker News

A group of academics from Ruhr University Bochum and New York University Abu Dhabi have uncovered security flaws in 4G LTE and 5G networks that could potentially allow hackers to impersonate users on the network and even sign up for paid subscriptions on their behalf. The impersonation attack — named « IMPersonation Attacks in 4G NeTworks » (or IMP4GT) — exploits the mutual authentication
Source de l’article sur The Hacker News

As we all know, Internet security is among the top risks faced by individuals and businesses today. With the evolution and robust growth of internet-enabled mobile devices across the globe, they have become the number one target for cyber attacks.

Mobile security involves protecting portable devices such as laptops, tablets, smart watches, and phones against cyber threats. Today, the need for protection is more critical because we store a lot of sensitive data like bank details, patients information on these devices.

Source de l’article sur DZONE