article thumbnail

RSAC Fireside Chat: The need to stop mobile apps from exposing API keys, user credentials in runtime

The Last Watchdog

As digital transformation accelerates, Application Programming Interfaces (APIs) have become integral to software development – especially when it comes to adding cool new functionalities to our go-to mobile apps. I learned this from Ted Miracco , CEO of Approov , in a discussion we had at RSA Conference 2023.

Mobile 200
article thumbnail

A cyberattack disrupted Lyca Mobile services

Security Affairs

International mobile virtual network operator Lyca Mobile announced it has been the victim of a cyber attack that disrupted its network. Lyca Mobile is a mobile virtual network operator (MVNO) that provides prepaid mobile phone services to customers in several countries worldwide. ” continues the statement.

Mobile 108
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What to do if you suspect your personal mobile has been hacked

BH Consulting

But what happens if you think your mobile has been breached? In this blog, we’ll look at how you can minimise the impact of your personal mobile being compromised. Check and protect what you value most Identify the important apps or files on your mobile phone. (Do Change the default PIN code to connect to mobile phone Bluetooth.

Mobile 105
article thumbnail

Data leak exposes users of car-sharing service Blink Mobility

Security Affairs

More than 22,000 users of Blink Mobility should take the necessary steps to protect themselves against the risk of identity theft. Los Angeles-based electric car-sharing provider Blink Mobility left a misconfigured MongoDB database open to the public.

Mobile 102
article thumbnail

Best Encryption Software for 2022

eSecurity Planet

It’s been a couple of decades since data tapes delivered by trucks made encryption a standard enterprise cybersecurity practice. Yet even as technology has changed, sending and receiving data remains a major vulnerability, ensuring encryption’s place as a foundational security practice. What is Encryption?

article thumbnail

Mobile Malware Uses Deepfakes, Social Engineering to Bypass Biometric Authentication

SecureWorld News

A sophisticated form of mobile malware dubbed "GoldPickaxe" has been uncovered, which collects facial recognition data to produce deepfake videos, enabling hackers to bypass biometric authentication protections on banking apps. The malware has been active since 2023, specifically targeting victims in Vietnam and Thailand.

article thumbnail

WhatsApp flaws could have allowed hackers to remotely hack mobile devices

Security Affairs

WhatsApp addressed two security vulnerabilities in its app for Android that could have been exploited to remotely hack the victim’s device. The communication with upstream servers and the E2E encryption implementation are two notable ones. SecurityAffairs – hacking, WhatsApp). Pierluigi Paganini.

Mobile 102