A new reverse proxy tool called Modlishka can easily automate phishing attacks and bypass two-factor authentication (2FA) — and it's available for download on GitHub.
Researchers uncovered an adaptable Android Trojan known as GPlayed that masquerades as Google Apps to spy on and steal information from victims.
A decades-old mobile security flaw resurfaced in recent weeks after a U.S. senator reported that cybercriminals exploited the Signaling System 7 (SS7) protocol to breach a mobile carrier.
Google is changing how it does two-step verification by replacing one-time SMS codes with new features and login protocols.
IBM experts Dustin Hoff and Ashish Malhotra discussed ways for businesses and end users to mitigate security issues stemming from SMS authentication.
A security researcher recently discovered how the popular mobile wallet Venmo can be hacked using SMS text messages and certain iOS quirks.
The latest targets of SMS phishing are iOS users. In fact, more than 7,500 users who clicked on a malicious link fell victim to a recent smishing attack.
Just like software or network defense, cybercriminals have found ways to circumvent and compromise SMS two-factor authentication.
A firm can face a malware breach if its risk engine does not see every stage of an attack, as one bank recently discovered.
A sophisticated man-in-the-browser (MitB) enterprise attack has been found to target users on virtual private networks at a major international airport.