Remove Information Security Remove Mobile Remove Social Engineering Remove Surveillance
article thumbnail

Sophisticated Android spyware PhoneSpy infected thousands of Korean phones

Security Affairs

Researchers from Zimperium zLabs uncovered an ongoing campaign aimed at infecting the mobile phones of South Korean users with new sophisticated android spyware dubbed PhoneSpy. The malware also allows an attacker to remotely control the infected mobile devices. The malware already hit more than a thousand South Korean victims.

Spyware 138
article thumbnail

Security Affairs newsletter Round 435 by Pierluigi Paganini – International edition

Security Affairs

Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

APT C-23 group targets Middle East with an enhanced Android spyware variant

Security Affairs

Upon opening the app, it requests that the user grant the app permissions to perform surveillance actions such as to access to the microphone to record audio and all files stored on the device. The malicious apps use social engineering to ask the user to grant advanced permissions.

Spyware 93
article thumbnail

Dangerous permissions detected in top Android health apps

Security Affairs

Leading Android health apps expose users to avoidable threats like surveillance and identity theft, due to their risky permissions. The Android challenge In the digital age, mobile applications have become an integral part of our lives, transforming the way we communicate, work, and entertain ourselves. Cybernews has the story.

article thumbnail

7 Cyber Security Courses Online For Everybody

Spinone

This course covers a broad range of security topics, explaining it with a simple language. Here are only seven out of 26 topics: Insider threats Passwords Security of mobile devices Social engineering Viruses Email security Human error To start the course, you need to register and choose the type of account you need.

article thumbnail

Janet Jackson Can Crash Laptops, Credential Phishing Attacks Skyrocket, A Phone Carrier That Doesn’t Track You

Security Boulevard

Janet Jackson’s “Rhythm Nation” has been recognized as an exploit for a vulnerability after Microsoft reported it can crash the hard drives of certain old laptop computers, phishing attacks that compromise credentials using brand impersonation are on the rise, and details about a new privacy focused phone carrier that doesn’t track your location or (..)

article thumbnail

Will iPhone’s New “Lockdown Mode” Create Dangerous Overconfidence In Apple’s CyberSecurity Capabilities?

Joseph Steinberg

Additionally, keep in mind that while Lockdown Mode may make it more difficult for attackers to exploit social engineering in order to compromise devices, until Apple more strictly controls what apps it allows in its app store , potential government spying remains a major problem. Is that really true?