Mobile

iPhone Mirroring Flaw Could Expose Employee Personal Information
A flaw in Apple's mirroring feature within the iOS 18 and macOS Sequoia software updates compromises personal privacy when used on work Macs, according to a report from Sevco Security ...
Security Boulevard

How Mobile ID Verification is Shaping the Future of Digital Payments
Integrating mobile ID verification into digital payment systems marks a significant milestone in the evolution of digital commerce ...
Security Boulevard

The Evolution of Phishing Attacks: Beyond Email and How to Protect Your Organization
Jimmy Lin | SlashNext Threat Lab | | AI, bec, Browser Phishing Protection, Browser protection, business email compromise, cyberthreats, Email Protection, executive impersonation, generative AI, generative ai gen ai, Mobile, Mobile Phishing Protection, Product, smishing
The Evolution of Phishing Attacks: Beyond Email Phishing attacks have long been synonymous with email, but the landscape of cyberthreats has evolved dramatically. Today, phishing is not confined to email inboxes; it ...

The Evolution of Phishing Attacks: Beyond Email and How to Protect Your Organization
Barry Strauss | | AI, bec, Browser Phishing Protection, Browser protection, business email compromise, cyberthreats, Email Protection, executive impersonation, generative AI, generative ai gen ai, Mobile, Mobile Phishing Protection, Product, smishing
The Evolution of Phishing Attacks: Beyond Email Phishing attacks have long been synonymous with email, but the landscape of cyberthreats has evolved dramatically. Today, phishing is not confined to email inboxes; it ...

Sophisticated Smishing Compromises Employee Accounts, Accesses Corporate Gift Card Systems
Stephen Kowski | | CTO Corner, Cybersecurity, cyberthreats, gift card scams, Mobile, Phishing, smishing, social engineering, social engineering scams
We at SlashNext want to draw attention to the alarming trend of cybercriminals exploiting advanced techniques to target retail corporations, as highlighted in the recent FBI Private Industry Notification (PIN). The threat ...

FCC Fines Wireless Carriers $200 million, Google’s Fight Against Malicious Apps
Tom Eston | | apps, ATT, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, fcc, fines, google, Google Play Store, Information Security, Infosec, location data, malicious apps, Mobile, Play Store, Podcast, Podcasts, Privacy, security, T-Mobile, technology, User Location Data, verizon, Weekly Edition, wireless
In episode 328, Tom and Kevin discuss two major cybersecurity and privacy news stories. The first topic covers the FCC issuing fines to major US wireless carriers for sharing users’ real-time location ...

What is Mobile App Fraud?
alluresecurity | | brand protection, Cybersecurity, fake mobile app, fake mobile apps, Mobile, Mobile App, mobile app fraud, mobile apps, spoofing
Mobile app fraud is a type of fraud involving the use of mobile applications on a smartphone, tablet, or similar device. Within that, there are many methods and strategies that fraudsters employ ...

Solving telecom network security challenges with Defensics
Learn about current network security challenges and how to overcome them. Get tips and best practices for the telecom industry. The post Solving telecom network security challenges with Defensics appeared first on ...
Considerations before moving away from native apps
Learn about the differences between and benefits of native and hybrid apps. The post Considerations before moving away from native apps appeared first on Software Security ...

iOS sideloading & alternative app stores: Preparing for increased brand risk this March
In March 2024 (less than 30 days), Apple’s iOS 17.4 will for the first time ever allow iOS sideloading or the download of iOS apps from alternative app stores other than the ...