Security News

Mobile data roaming traffic generated by consumer and IoT devices expected to surge
2020-02-05 05:00

Mobile data roaming traffic generated by consumer and IoT devices reached 737 Petabytes in 2019, according to Kaleido Intelligence. Driven by the significant increase in roaming data traffic across key regions including Asia-Pacific, Middle East and Africa, Kaleido predicts that consumer inbound wholesale roaming revenues will reach $16 billion in 2024, with IoT adding a further $5.7 billion.

Scientists test forensic methods to acquire data from damaged mobile phones
2020-02-04 05:30

Criminals sometimes damage their mobile phones in an attempt to destroy data. Manufacturers use those taps to test their circuit boards, but by soldering wires onto them, forensic investigators can extract data from the chips.

Your mobile network broke the law by selling location data and may be fined millions... or maybe not, shrugs FCC
2020-02-04 00:56

The chair of the House Energy and Commerce Committee - which oversees the FCC - Frank Pallone issued a statement: "Following our longstanding calls to take action, the FCC finally informed the Committee today that one or more wireless carriers apparently violated federal privacy protections by turning a blind eye to the widespread disclosure of consumers' real-time location data. This is certainly a step in the right direction, but I'll be watching to make sure the FCC doesn't just let these lawbreakers off the hook with a slap on the wrist." For her part, Commissioner Rosenworcel put out a statement saying: "For more than a year, the FCC was silent after news reports alerted us that for just a few hundred dollars, shady middlemen could sell your location within a few hundred meters based on your wireless phone data."

93% of attempted mobile transactions in 2019 were fraudulent
2020-01-31 05:30

93 percent of total mobile transactions in 20 countries were blocked as fraudulent in 2019 according to a report on the state of malware and mobile ad fraud released by Upstream. In these five cases alone, 353 million suspicious mobile transactions were detected and blocked preventing $430 million in fraudulent charges.

Bezos, WhatsApp Cyberattacks Show Growing Mobile Sophistication
2020-01-30 18:03

Beyond these high-profile instances, various journalists and human rights activists have been targeted globally after a WhatsApp zero-day vulnerability was exploited by attackers who were able to inject spyware onto victims' phones. Vanunu, head of products vulnerability research at Check Point research, has seen his share of WhatsApp vulnerabilities - the researcher at Black Hat 2019 demoed several flaws in the messaging platform could be used to manipulate chats, for instance.

How to enable facial recognition in the BitWarden mobile password manager
2020-01-29 20:19

The latest version of the BitWarden Android client supports facial recognition. BitWarden is an outstanding password manager that includes all the bells and whistles you've come to expect from such a tool.

How to enable facial recognition in the BitWarden mobile password manager
2020-01-29 20:18

The latest version of the BitWarden Android client supports facial recognition. Find out how to enable it.

Mobile Carrier Customer Service Ushers in SIM-Swap Fraud
2020-01-17 21:03

Mobile carriers have left the door wide open to SIM-swap attacks, particularly when it comes to prepaid accounts, researchers have found. According to PhishLabs, a typical attack would start with an attacker phishing personal and banking information - often via SMS phishing, which has the added benefit of confirming that a victim's cell phone number is an active line.

Major U.S. Mobile Carriers Vulnerable to SIM Swapping Attacks
2020-01-14 16:34

Weak security measures in place at several major wireless carriers in the United States make it easy for attackers to perform SIM swap attacks on prepaid mobile accounts, a recent study found. In a SIM swapping attack, social engineering is used to convince a wireless services provider to hand over control of the victim's phone number by modifying the SIM card attached to the phone and mobile account.

A 101 guide to mobile device management
2020-01-14 06:40

A mobile device management solution provides similar features that you would expect a systems management solution would use to manage PCs. However, mobile devices are not network-connected in the same manner as PCs, so a solution for mobile device management must rethink communications. The basic components of a mobile device management solution would consist of a server and an agent which would communicate with each other in order to complete commands and tasks.