Mobile Security

Google removes risky ‘ Bread ‘ applications from the Play Store

Google pulled about 1,700 separate apps that were part of a family of potentially unwanted services from its Google Play application store.  This family of potentially harmful applications–dubbed “Bread” and also known as “Joker” –was involved in billing fraud and first observed in 2017, where the apps focused solely on SMS fraud.  Over time, the

[ Read More ]

Current Gustuff Mobile Banking Version Trojan Emerges

Gustuff’s recent Android banking campaigns have included an updated malware version, reports Cisco Talos security researchers. Earlier this year, shortly after the software was described, its operators switched delivery hosts, then moved to remove the C&C network, but continued to control the software via a SMS-based secondary management system. The Gustuff now has a smaller

[ Read More ]

Decade-old Avaya Phone Security Flaw, Patched At Last

Who can ever forget of Avaya phones and its near-monopoly of the corporate communication equipment market for Fortune 100 companies pre-Skype? As software VOIP solutions matured, companies are slowly but surely migrating away from hardware-based VOIP phones, including Avaya. For the last 10 years that Avaya ruled the offices, it harbored a remote code execution

[ Read More ]

Android Security Out Of Google’s Control, Malware Infections Persists

“Security patch” is a term that refers to programs and data that fix known vulnerability in the software. Vulnerabilities are weaknesses, software bugs which can be “weaponized” in order to compromise the security and privacy of users. How many times we have witnessed in the mobile space, more particularly on Android having many unpatched defects,

[ Read More ]

How To Secure Our Smart Devices Today?

Smartphones are an indispensable tool for many people, it becomes the most personal computer of all personal computers. The realization of information at your fingertips that Bill Gates was selling way back from the mid-’90s, but only came to the mainstream market in 2007 with the release of Apple’s first iPhone. Although smartphones are now

[ Read More ]

Fundamentals Of Security Precautions For IoT Devices

When it comes to security risks in using the Internet today, many people may first think of malicious attacks on PCs, smartphones, and servers by malicious third parties. But we are at the wake of the massive Intel-processor MDS (Microarchitectural Data Sampling) security bugs, which can only be mitigated 100% with the complete disabling of

[ Read More ]

5 Mobile Security Threats to be Taken Seriously In 2019

Nowadays, mobile security ranks high on the list of concerns for all companies, and this is for good reason: now almost all workers access company data from smartphones on a regular basis. It means that keeping sensitive information safe is an increasingly complex puzzle. The stakes are higher than ever: The average cost of a

[ Read More ]

What Can Make You Decide? iOS vs Android

If you are seeking to develop apps for smartphone for the first time, deciding on what platform to choose is a daunting task. That’s because the patterns of usage between mobile platforms dictate the profitability of your app. This includes the willingness of the userbase to even try your app in the first place, which

[ Read More ]

Major IT Issues: Threats Posed By Mobile Fraud & Account Theft

Smartphones and other mobile devices such as tablets and smartwatches are fast becoming more “personal computers” than the PC. People interact with these devices and store more personally identifiable information in them more than any laptop or desktop computer. In today’s technology-driven world, even the first thing to do after waking-up is checking the notification

[ Read More ]

Android Phone as Physical Security Key for Google Accounts

Great news indeed! Google has come up with a new advanced two-factor authentication method that would help you secure your Google accounts using your Android phone as a physical security key. This new advanced two-factor authentication method secures Google accounts when users log in using the Chrome browser. This service can be used on Android

[ Read More ]