Plato Data Intelligence.
Vertical Search & Ai.

Tag: Mobile Security

SIM Card Ownership Slashed in Burkina Faso

Burkina Faso aims to increase mobile security in the African country with a new bill that says users can only hold two SIM cards (i.e.,...

Bitdefender Launches Scam Alert App For iOS

Tyler Cross Published on: August 24, 2023 Bitdefender, the popular cybersecurity company, has released its previously Android-only Scam...

FEITIAN and Elyctis Forge Strategic Partnership to Deliver the Cutting-edge of Identity Authentication and Verification Solutions

FEITIAN and Elyctis Forge Strategic Partnership to Deliver Identity Authentication and Verification Solutions "The combination of FEITIAN's expertise in identity authentication...

Android app breaking bad: From legitimate screen recording to file exfiltration within a year

ESET researchers have discovered a trojanized Android app that had been available on the Google Play store with over 50,000 installs. The app, named...

7 tips for spotting a fake mobile app

You’ve just downloaded a new mobile game, cryptocurrency wallet, or fitness app, but something isn’t right. Your phone’s screen is swamped by annoying ads,...

Critical Infrastructure Workers Better At Spotting Phishing

Phishing simulation training for employees appears to work better at critical infrastructure organizations than it does across other sectors, with 66% of those employees...

Mobile Cyberattacks Soar, Especially Against Android Users

Attackers are increasingly targeting users through their mobile devices, attacking vulnerabilities in services that are built into applications and mounting increasing numbers of SMS phishing attacks.That's...

US Investors Sniffing Around Blacklisted NSO Group Assets

NSO Group is facing a number of existential crises at the moment, and it appears there's a group of enterprising investors — including, reportedly,...

7 tips for spotting a fake mobile app | WeLiveSecurity

Plus, 7 ways to tell that you downloaded a sketchy app and 7 tips for staying safe from mobile security threats in the...

Android app breaking bad: From legitimate screen recording to file exfiltration within a year | WeLiveSecurity

ESET researchers discover AhRat – a new Android RAT based on AhMyth – that exfiltrates files and records audio ESET researchers have...

Microsoft Azure VMs Highjacked in Cloud Cyberattack

A threat actor known for targeting Microsoft cloud environments now is employing the serial console feature on Azure virtual machines (VMs) to hijack the...

Microsoft Azure VMs Hijacked in Cloud Cyberattack

A threat actor known for targeting Microsoft cloud environments now is employing the serial console feature on Azure virtual machines (VMs) to hijack the...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?