SIM swap scams are increasingly profitable for criminals with the growing dependence on phone-based authentication and mobile wallets storing cryptocurrencies. Are mobile carriers doing enough to prevent SIM swap fraud?
Latest variant of Fakebank Android malware adds even more functional threats to banking clients – in the form of ‘vishing’ (voice phishing). It can now intercept outgoing and incoming calls which is then redirected to scammers which allows them to pose as legitimate employees of the bank.
While we often think about malicious users when we speak of insider threats, the "real" problem lies with users that may unintentionally be putting their organizations at risk. This includes users that get phished, bypass controls for convenience or efficiency, and connect their own devices to the corporate networks.
With the Play Store distributing malicious apps like fake WhatsApp and malware, is downloading only from trusted Android stores still a relevant approach?
Indian government subjects phone makers to cyber security standards and are required to report their hardware, software and network security measures by August 28th.
Mobile smartphone usage is now reaching saturation point in the developed world. Increasingly mobile phones are becoming (or have become) indispensable business tools as well as powerful communication devices. However, with great power comes great responsibility – something that seems to have escaped U.S. President…