Webmaster Forum

Go Back   Webmaster Forum > The Webmaster Forums > Tech Talk > Mobile Technology

Mobile Technology Topics include mobile devices, discussions about service providers, apps, updates and more.


Closed Thread
 
LinkBack Thread Tools Display Modes
Share |
  #21 (permalink)  
Old 10-19-2016, 03:52 PM
snakeair's Avatar
Super Moderator
Latest Blog:
None

 
Join Date: 12-31-07
Location: Medford, NJ
Posts: 54,771
iTrader: 3 / 100%
IoT Security Baffles 65% of IT Staff

Quote:
While most businesses see opportunity in the Internet of Things (IoT), organizations lack understanding of how to properly secure the growing number of devices connected to their enterprise networks.

According to a ForeScout Technologies report, IT departments are faced with an increased size and diversity of attack surface: The average business expects to be dealing with 7,000 IoT devices over the next 18 months. Even smaller businesses expect the numbers to be hundreds or thousands; far more than they are used to securing when it comes to traditional user endpoints.
Continued at: http://www.infosecurity-magazine.com...5-of-it-staff/
__________________
Staff @WPArena.com
 

Advertisement

Advertisement

  #22 (permalink)  
Old 10-21-2016, 08:32 AM
snakeair's Avatar
Super Moderator
Latest Blog:
None

 
Join Date: 12-31-07
Location: Medford, NJ
Posts: 54,771
iTrader: 3 / 100%
Apple iOS Devices: Leakier Than Android

Very slowly hides his apple device under the table.

Quote:
While conventional wisdom says that Android has laxer security than iOS, research suggests differently: Zscaler found that more Apple iOS mobile devices are leaking information like the exact location of devices and their owners than Android.

Over the past three months, millions of both device types were found to be leaking enterprise data, privacy information and unique mobile device identifications.

“Each quarter, we see more than 45 million transactions related to mobile devices going through our cloud,” Zscaler said, in a blog. “The majority of the privacy-related information we see falls into one of three categories: Device metadata; location; and personally identifiable information (PII).”
Continued at: http://www.infosecurity-magazine.com...-leakier-than/
__________________
Staff @WPArena.com
 
  #23 (permalink)  
Old 10-28-2016, 07:09 AM
snakeair's Avatar
Super Moderator
Latest Blog:
None

 
Join Date: 12-31-07
Location: Medford, NJ
Posts: 54,771
iTrader: 3 / 100%
FIDO, EMVCo Prep for Pay-by-Selfie Era

Quote:
As things like pay-by-selfie hit the commercial market, the FIDO Alliance and card issuer consortium EMVCo have decided to align their efforts to produce a new mobile payment specification.

The two groups announced at Money20/20 that they will work to add convenience and security to in-store and in-app EMV-compliant mobile payments. The spec is an extension to the Web Authentication specification already in development by the World Wide Web Consortium (W3C), which will enable FIDO strong authentication across all web browsers and related web platform infrastructure.
Continued at: http://www.infosecurity-magazine.com...ybyselfie-era/
__________________
Staff @WPArena.com
 
  #24 (permalink)  
Old 11-03-2016, 06:57 PM
snakeair's Avatar
Super Moderator
Latest Blog:
None

 
Join Date: 12-31-07
Location: Medford, NJ
Posts: 54,771
iTrader: 3 / 100%
Exaspy, a New Android Spyware, Targets Execs

o nuts.

Quote:
A new mobile spyware package called Exaspy has been uncovered. Its authors target high-value enterprise executives in a quest to gain access to all of the victim’s data.

Skycure found the commercial Android kit attacking executives and gaining access to chats and messages (both native and over-the-top, so SMS, MMS, Facebook Messenger, Google Hangouts, Skype, Gmail, native email client, Skype, Viber, WhatsApp and more); pictures, contact lists, calendars, browser history, call logs and more. It can also record phone calls and audio it captures in the background, and take secret screenshots of the device.
Monitor and transmit local files, such as photos and videos taken.

Execute shell commands, or spawn a reverse shell, which allows the app to elevate its privileges using exploits that are not included in the basic package.
Continued at: http://www.infosecurity-magazine.com...droid-spyware/
__________________
Staff @WPArena.com
 
  #25 (permalink)  
Old 11-05-2016, 05:52 PM
snakeair's Avatar
Super Moderator
Latest Blog:
None

 
Join Date: 12-31-07
Location: Medford, NJ
Posts: 54,771
iTrader: 3 / 100%
Android Info-stealing Baddie Targets Almost 100 Banks

Yikes!!

Quote:
An Android banking malware campaign has hit nearly 100 banks*in the United States, Germany, France, Australia, Turkey, Poland and Austria.

According to Fortinet, the bad actors are targeting customers of large banks, looking to steal login credentials from 94 different mobile banking apps. Due to its ability to intercept SMS communications, the malware is also able to bypass SMS-based two-factor authentication.

After the malware is installed it can not only send and intercept SMS messages, but it can perform a factory reset to wipe the phone (with the potential for huge data loss for the user). It also lures the user to submit credit card info by popping up a request for banking details any time an app is launched on the device. The malware is able to verify if the card number submitted by the user is valid, and if it is, the malware pops up a fake “Verified by Visa” or “MasterCard SecureCode” view.
Continued at: http://www.infosecurity-magazine.com...addie-targets/
__________________
Staff @WPArena.com
 
  #26 (permalink)  
Old 11-11-2016, 05:16 PM
snakeair's Avatar
Super Moderator
Latest Blog:
None

 
Join Date: 12-31-07
Location: Medford, NJ
Posts: 54,771
iTrader: 3 / 100%
Sign in with Facebook' Threatens Millions of Devices

Quote:
Signing into secure websites with Facebook or Google is awfully convenient—especially when using a mobile device. But widespread, incorrect usages of a foundational technology by third-party mobile app developers gives hackers almost-effortless access to more than one billion apps and millions of devices.

A study from Ronghai Yang, Wing Cheong Lau and Tianyu Liu of the University of Hong Kong shows that implementation flaws with the OAuth2.0 protocol can be exploited remotely to sign into a victim’s mobile app account without any involvement or awareness of the victim.
Continued at: http://www.infosecurity-magazine.com...ook-threatens/
__________________
Staff @WPArena.com
 
  #27 (permalink)  
Old 11-19-2016, 06:44 PM
snakeair's Avatar
Super Moderator
Latest Blog:
None

 
Join Date: 12-31-07
Location: Medford, NJ
Posts: 54,771
iTrader: 3 / 100%
Android Vulnerability Affects 2.8 Million Devices

hmmm

Quote:
A new Android vulnerability, estimated to impact 2.8 million devices worldwide at its peak, has been uncovered by security ratings firm BitSight.

The vulnerability, which affects devices out of the box, involves Android devices (including BLU Studio G from Best Buy) and an over-the-air (OTA) update mechanism associated with the software company, Ragentek Group, in China. Certain mobile phones are this vulnerable to man-in-the-middle attacks, allowing adversaries to execute arbitrary commands as a privileged user—such as extracting information or remotely wiping the device—and making it possible to gain access to other systems on a corporate network and steal sensitive information.
Continued at: http://www.infosecurity-magazine.com...ty-affects-28/
__________________
Staff @WPArena.com
 
  #28 (permalink)  
Old 11-23-2016, 09:46 AM
snakeair's Avatar
Super Moderator
Latest Blog:
None

 
Join Date: 12-31-07
Location: Medford, NJ
Posts: 54,771
iTrader: 3 / 100%
Deliveroo Under Fire After Hungry Hackers Defraud Firm

In the news...

Quote:
Takeaway delivery service Deliveroo has come under criticism after an investigation revealed customers have had their accounts broken into and used to run up huge bills.

BBC’s Watchdog program discovered some users of the popular service were left several hundred pounds out of pocket.

"I noticed that I had a 'thank you' email from Deliveroo for a burger joint in Chiswick,” Judith MacFayden, from Reading, told the program. “I thought that was really odd so I went on to my account and had a look and there had been four orders that afternoon to a couple of addresses in London.”

Deliveroo claimed the accounts were hacked because customers reused credentials from other accounts which were compromised in a data breach.
Continued at: http://www.infosecurity-magazine.com...-after-hungry/
__________________
Staff @WPArena.com
 
  #29 (permalink)  
Old 11-25-2016, 06:18 PM
snakeair's Avatar
Super Moderator
Latest Blog:
None

 
Join Date: 12-31-07
Location: Medford, NJ
Posts: 54,771
iTrader: 3 / 100%
Smartphone App Flaw Leaves Tesla Vehicles Vulnerable To Theft



Quote:
Tesla cars can be tracked, located, unlocked and driven away by compromising the company’s smartphone app.

Researchers at Norwegian app security firm Promon demonstrated how easy it appears to be to steal a Tesla. Benjamin Adolphi, mobile software developer at Promon, said he used “simple, known vulnerabilities” that have been around for a long time. He created a fake free Wi-Fi hotspot that featured an ad targeted at Tesla owners, offering them a free burger at a local restaurant.

Owners were then prompted to download an application in order to take advantage of the offer; however the app contained malware hat “manipulated” the Tesla app to grab the owner’s username and password.
Continued at: http://www.infosecurity-magazine.com...esla-vehicles/
__________________
Staff @WPArena.com
 
  #30 (permalink)  
Old 12-16-2016, 06:54 AM
snakeair's Avatar
Super Moderator
Latest Blog:
None

 
Join Date: 12-31-07
Location: Medford, NJ
Posts: 54,771
iTrader: 3 / 100%
Tordow Android Trojan Can Do...Just About Anything

Some news..

Quote:
A wide-ranging catch-all Android malware known as Tordow v2.0 is affecting Russian victims, and researchers expect it to migrate to other parts of the globe.

Notably, Tordow is the first mobile banking Trojan for the Android operating system that seeks to gain root privileges on infected devices. According to Comodo Threat Research Labs, typically, banking malware does not require root access to perform its malicious activities. But, with root access, hackers acquire a wider range of functionality.

To wit: Tordow 2.0 can make telephone calls, control SMS messages, download and install programs, steal login credentials, access contacts, encrypt files, visit webpages, manipulate banking data, remove security software, reboot a device, rename files and act as ransomware. It searches the Android and Google Chrome browsers for stored sensitive information. Technical details show that Tordow 2.0 also collects data about device hardware and software, operating system, manufacturer, ISP and user location.
Continued at: http://www.infosecurity-magazine.com...trojan-can-do/
__________________
Staff @WPArena.com
 
  #31 (permalink)  
Old 12-21-2016, 01:26 AM
snakeair's Avatar
Super Moderator
Latest Blog:
None

 
Join Date: 12-31-07
Location: Medford, NJ
Posts: 54,771
iTrader: 3 / 100%
Tordow Android Trojan Can Do...Just About Anything

Quote:
A wide-ranging catch-all Android malware known as Tordow v2.0 is affecting Russian victims, and researchers expect it to migrate to other parts of the globe.

Notably, Tordow is the first mobile banking Trojan for the Android operating system that seeks to gain root privileges on infected devices. According to Comodo Threat Research Labs, typically, banking malware does not require root access to perform its malicious activities. But, with root access, hackers acquire a wider range of functionality.

To wit: Tordow 2.0 can make telephone calls, control SMS messages, download and install programs, steal login credentials, access contacts, encrypt files, visit webpages, manipulate banking data, remove security software, reboot a device, rename files and act as ransomware. It searches the Android and Google Chrome browsers for stored sensitive information. Technical details show that Tordow 2.0 also collects data about device hardware and software, operating system, manufacturer, ISP and user location.
Continued at: http://www.infosecurity-magazine.com...trojan-can-do/
__________________
Staff @WPArena.com
 
  #32 (permalink)  
Old 01-28-2017, 09:25 AM
snakeair's Avatar
Super Moderator
Latest Blog:
None

 
Join Date: 12-31-07
Location: Medford, NJ
Posts: 54,771
iTrader: 3 / 100%
Why Containerisation Matters More Than Ever Before



Quote:
Enterprise mobility has come a long way in the past two decades. When the concept was first coined, it meant giving a select number of staff corporate mobile devices with email access, or possibly going so far as to equip them with a laptop for occasional home or remote usage. Few would have predicted it would ultimately mean staff sat in the office while accessing the corporate network via their personal smartphone, checking their emails while walking from one meeting room to the next, setting up their tablet as a second screen on their desk or uploading documents to their personal cloud to be accessed on their journey home.

The revolution in enterprise mobility has been driven from the ground up, a case of employees taking technology into their own hands to do things more quickly and efficiently while leaving the IT department trailing in their wake. As organizations mobilize, they cannot afford to compromise corporate security: yet mobility is in a constant state of flux, with new innovations in communication, collaboration and productivity-enhancing technology continuing to disrupt and confound conventional security practices.
Continued at: https://www.infosecurity-magazine.co...atters-before/
__________________
Staff @WPArena.com
 
  #33 (permalink)  
Old 02-23-2017, 05:55 AM
snakeair's Avatar
Super Moderator
Latest Blog:
None

 
Join Date: 12-31-07
Location: Medford, NJ
Posts: 54,771
iTrader: 3 / 100%
Financial Phishing and Banking Malware Surge in 2016

Quote:
Nearly half of all phishing attacks are now designed to steal the victim’s money – an all-time high, according to new data from Kaspersky Lab.

The Russian AV vendor claimed that financial phishing attacks grew 13% in 2016 to reach 47% of all phishing detections made by its heuristic engines.
Victims are typically tricked into believing they are viewing genuine banking pages*and socially engineered into handing over their log-ins as a result.

The effect on those brands which are phished can be a loss of trust and even customer attrition.

Nadezhda Demidova, senior web content analyst at Kaspersky Lab, argued that this type of phishing has always been one of the easiest ways for hackers to make money.
Continued at: https://www.infosecurity-magazine.co...nking-malware/
__________________
Staff @WPArena.com
 
  #34 (permalink)  
Old 03-05-2017, 11:02 AM
snakeair's Avatar
Super Moderator
Latest Blog:
None

 
Join Date: 12-31-07
Location: Medford, NJ
Posts: 54,771
iTrader: 3 / 100%
Password Re-use is Rampant Among Millennials 18-30

I'll be 37 in a month so I'm good. lmao

Quote:
Nearly 60% of mobile device users have had to reset a password in the past two months.

Further, a survey by Keeper Security*has found that more than half of respondents are still trying to remember their passwords in their heads. They are also two times more likely to have trouble logging into an account if they wrote their passwords down or tried to memorize them.

This is directly related to the alarming statistic that found that 87% of mobile device users between the ages of 18-30 reuse passwords across multiple websites and applications.

This bad habit could result in millions of accounts being compromised since hackers typically test a stolen password against multiple accounts, including banking, retail, social media, email and healthcare websites. One stolen password could give a hacker the keys to a person’s digital life.**
Continued at: https://www.infosecurity-magazine.co...rampant-among/
__________________
Staff @WPArena.com
 
  #35 (permalink)  
Old 03-09-2017, 09:43 AM
snakeair's Avatar
Super Moderator
Latest Blog:
None

 
Join Date: 12-31-07
Location: Medford, NJ
Posts: 54,771
iTrader: 3 / 100%
'Secure' Messaging App Riddled with Security Flaws

Quote:
A messaging app reportedly popular with White House aides had several security issues that could have resulted in user details being exposed, security researchers have announced.

According to researchers at IOActive, Confide, an encrypted messaging service for Windows, Android and Apple devices, had*“multiple security vulnerabilities of varying severities.” main issues discovered by IOActive’s researchers included the application’s notification system not requiring a valid SSL server certificate to communicate. This meant sessions were vulnerable to man-in-the-middle (MITM) attacks.

Messages did not have to be encrypted when sent, and users were given no indication when an unencrypted message was sent, IOActive said. The app also failed to use authenticated encryption, meaning messages could have been altered in transit. Also on the messaging front, there was no participant fingerprint authentication mechanism. This could have resulted in MITM attacks.
Continued at: https://www.infosecurity-magazine.co...-riddled-with/
__________________
Staff @WPArena.com
 
  #36 (permalink)  
Old 03-26-2017, 06:15 AM
snakeair's Avatar
Super Moderator
Latest Blog:
None

 
Join Date: 12-31-07
Location: Medford, NJ
Posts: 54,771
iTrader: 3 / 100%
Chinese Trojan Spreads Via Fake Base Stations

Quote:
Security experts have uncovered a sophisticated cyber-attack campaign in China designed to spread Android malware via fake mobile base stations.

The “Swearing Trojan” malware – so named because of the Chinese expletives found in its code – was first discovered by Chinese web giant Tencent’s security business.

It’s designed to steal personal info and even bypass banks’ two-factor authentication systems by intercepting incoming SMS codes for account log-ins.
Most interestingly it has been observed spreading via fake base transceiver stations (BTSs), which are operated by the attackers. These send phishing texts to the targeted phones spoofed to appear as if they came from telcos China Mobile and China Unicom.
Continued at: https://www.infosecurity-magazine.co...eads-via-fake/
__________________
Staff @WPArena.com
 
  #37 (permalink)  
Old 04-23-2017, 07:09 AM
snakeair's Avatar
Super Moderator
Latest Blog:
None

 
Join Date: 12-31-07
Location: Medford, NJ
Posts: 54,771
iTrader: 3 / 100%
Mobility Programs Snowball but Security Concerns Remain

Quote:
As mobility shifts from a new initiative to a foundational capability for the enterprise, organizations are expressing new needs from their enterprise mobility programs, according to new research. Security concerns remain top of mind.

Apperian’s 2017 Executive Enterprise Mobility report, conducted in conjunction with CITO Research, which found that 57% of respondents are concerned about corporate data on personal and other non-managed devices. This concern is on the rise, up 13% from last year.
Continued at: https://www.infosecurity-magazine.co...-snowball-but/
__________________
Staff @WPArena.com
 
  #38 (permalink)  
Old 04-29-2017, 11:43 AM
snakeair's Avatar
Super Moderator
Latest Blog:
None

 
Join Date: 12-31-07
Location: Medford, NJ
Posts: 54,771
iTrader: 3 / 100%
MilkyDoor Infests 200 Android Apps

Yikes!!!

Quote:
About 200 unique Android apps have been embedded with the MilkyDoor backdoor, which is built to attack an enterprise’s internal networks, private servers, and ultimately, corporate assets and data.

According to Trend Micro, the trojanized apps masquerade as recreational applications like style guides and Doodle applications, and are likely legitimate apps which cyber-criminals have repackaged and then republished in Google Play, banking on their popularity to draw victims. One of the apps had installs ranging between 500,000 and a million on Google Play.
Continued at: https://www.infosecurity-magazine.co...-android-apps/
__________________
Staff @WPArena.com
 
Go Back   Webmaster Forum > The Webmaster Forums > Tech Talk > Mobile Technology

Closed Thread


Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
 
Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are Off
Pingbacks are Off
Refbacks are Off


Similar Threads
Thread Thread Starter Forum Replies Last Post
Optimizing Forms for Mobile Devices HTMLBasicTutor Web Design Lobby 4 05-11-2015 03:52 AM
Google ads not showing on mobile devices? adsolist AdSense 9 07-18-2014 06:30 AM
Display Issues on mobile devices vcongion Coding Forum 0 07-24-2011 10:50 PM
SEO and Mobile Devices WM-Scott SEO Forum 9 08-31-2010 09:45 PM


V7N Network
Get exposure! V7N I Love Photography V7N SEO Blog V7N Directory


All times are GMT -7. The time now is 04:59 AM.
Powered by vBulletin
Copyright © 2000-2014 Jelsoft Enterprises Limited.
Copyright © 2003 - 2014 Escalate Media




Search Engine Optimization by vBSEO 3.6.0 RC 2 ©2011, Crawlability, Inc.