SMS

E2EE is MIA in iPhone/Android Chat — GSMA Gonna Fix it
Richi Jennings | | android, Apple, Apple iOS, Apple iPhone, china, E2EE, end-to-end, end-to-end encryption, google, Great Firewall of China, GSMA, iChat, imessage, ios, iOS 18, iPhone, iphone security, MLS, RCS, RCS protocol, SB Blogwatch, SMS, SMS messages
No More Barf-Green Bubbles? GSM Association is “excited” to bring Apple and Google closer together, but encryption is still lacking ...
Security Boulevard

Telegram Privacy Nightmare: Don’t Opt In to P2PL
Richi Jennings | | 2-step verification, 2fa, 2FA apps, 2FA bypass, 2FA Flaws, 2FA/MFA, Access control and Identity Management, Cloud MFA, digital identity verification, iam, ID verification, MFA, mfa login, mfasecurity, Multi-Factor Authentication (MFA), P2P, SB Blogwatch, SMS, SMS messages, SMS Toll Fraud, Telegram, Telegram app, two-factor-authentication.2fa, Verify 2FA
Scary SMS shenanigans: Avoid Telegram’s new “Peer-To-Peer Login” program if you value your privacy or your cellular service ...
Security Boulevard

Phishing Threats Rise as Malicious Actors Target Messaging Platforms
As messaging apps like Telegram gain popularity, cybercriminals are increasingly finding they are an attractive vector for phishing attacks ...
Security Boulevard

Apple Finally Adopts RCS, AI Powered Scams Targeting the Elderly
Tom Eston | | AI, AI-Powered, android, Apple, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Elderly, Episodes, Fraud, google, imessage, Information Security, Infosec, MMS, Podcast, Podcasts, Privacy, RCS, Rich Communication Services, Scams, security, Seniors, SMS, social engineering, technology, Voice Cloning, Weekly Edition
In this episode, Tom shows off AI generated images of a “Lonely and Sad Security Awareness Manager in a Dog Pound” and the humorous outcomes. The conversation shifts to Apple’s upcoming support ...

FCC’s Got New Rules for SIM-Swap and Port-Out Fraud
Richi Jennings | | 2 factor, 2 factor auth, 2-factor authentication, 2FA apps, 2FA bypass, 2FA Flaws, 2FA phishing, 2FA policies, 2FA/MFA, Cloud MFA, DUAL FACTOR AUTHENTICATION, fcc, FCC Failures, FCC Follies, hacking two factor, Jessica Rosenworcel, MFA, MFA hacks, mfasecurity, Multi-Factor Authentication (MFA), number port-out fraud, number port-out scams, Number Portability Administration Center, port-out scams, SB Blogwatch, SIM swap, sim swap fraud, SIM swap scams, SIM swapping, SMS, SMS messages, SMS phishing, sms scam, SMS scams, smshing, two-factor-authentication.2fa
Too many times: Federal Communications Commission shuts stable door after horse bolted. But chairwoman Jessica Rosenworcel (pictured) was hoping it would save us ...
Security Boulevard

Addressing the Mobile Malware Threat With Zero-Trust
AI-enabled zero-trust solutions can help address the rising threat of mobile malware ...
Security Boulevard

Today’s cybersecurity health checks must identify AI based threats. Does yours?
Barry Strauss | | AI, artificial intellignece, bec, business email compromise, ChatGPT, credential stealing, Email Protection, FBI, generative AI, human, Malware, Microsoft Outlook, Mobile Phishing, observability, Phishing, smishing, SMS, social engineering, spear-phishing, Threat Intelligence, vishing
Your organization will most likely face AI based threats in cybersecurity at some point this year. And as such, you can’t rely on outdated risk assessment methodologies that struggle to keep pace ...

Lessons from the Field, Part I: Backup and Disaster Recovery
By James Keiser, Director of Secured Managed Services Southeast, CISO Global, Inc. In the ongoing battle to protect corporate data, you can’t afford to miss a step. I’ve seen, first-hand, what can ...

FINALLY! FCC Acts on SMS Scam-Spam — But Will It Work?
Richi Jennings | | Caller ID Spoofing, fcc, Federal Communications Commission, SB Blogwatch, scam, SMS, SMS fraud, SMS messages, SMS phishing, sms scam, SMS scams, SMS Spam, smshing, Spam, STIR/SHAKEN, U.S. Federal Communications Commission
Federal Communications Commission rules to block illegal text messages. What took you so long? ...
Security Boulevard

Mobile BEC Attacks on the Rise
A recent uptick in the reports of SMS-based business email compromise (BEC) messages may indicate a wider trend that has seen a surge of phishing scams via text messages. “Phishing scams are ...
Security Boulevard