In ongoing consultations with clients, large companies named targeted attacks and hacking as two of their biggest security challenges since they can seriously impact the continuity of business activities in an organization. Attackers have many means to infiltrate companies. However, many attacks, don’t require a very high level of technological sophistication. Instead, techniques like targeted social … More Hacking and targeted cyber-attacks as a result of anti-competitive practices in business
What issues would face scanning attached to a mobile device resolve and, if used correctly, would it make the incursion into my privacy acceptable? On December 1st, China’s regulation requiring people to have their face scanned when subscribing for a new mobile phone took effect. If you were not aware of this regulation your initial … More Face scanning – privacy concern or identity protection?
ESET researchers discover a new Android ransomware family that attempts to spread to victims’ contacts and deploys some unusual tricks. NOTE: Users with ESET Mobile Security receive a warning about the malicious link; should they ignore the warning and download the app, the security solution will block it. After two years of decline in Android … More New ransomware attacking Android mobiles by tricking Reddit users
One of the most prevalent forms of cyber-attacks, phishing takes the form of an email or a text message designed to trick us into giving up our personal information. A phishing email may be disguised to look as though it comes from a financial institution such as a bank. The aim of the email … More What is Phishing and why is it a problem?
ESET analysis uncovers a novel technique bypassing SMS-based two-factor authentication while circumventing Google’s recent SMS permissions restrictions. When Google restricted the use of SMS and Call Log permissions in Android apps in March 2019, one of the positive effects was that credential-stealing apps lost the option to abuse these permissions for bypassing SMS-based two-factor authentication (2FA) mechanisms. … More Malware sidesteps Google permissions policy with new 2FA bypass technique