May 8, 2019 Fraudsters Sending Email, SMS Messages Linked to Tech Support Scams Hosted on the Cloud 2 min read - Digital fraudsters are sending out emails and SMS messages that link to tech support scams hosted on popular cloud platforms.
January 15, 2019 New Reverse Proxy Tool Can Bypass Two-Factor Authentication and Automate Phishing Attacks 2 min read - A new reverse proxy tool called Modlishka can easily automate phishing attacks and bypass two-factor authentication (2FA) — and it's available for download on GitHub.
October 23, 2018 GPlayed Android Trojan Imitates Google Apps to Spy On and Steal Data From Victims 2 min read - Researchers uncovered an adaptable Android Trojan known as GPlayed that masquerades as Google Apps to spy on and steal information from victims.
June 27, 2018 How a 40-Year-Old Mobile Security Flaw Puts Consumers at Risk 3 min read - A decades-old mobile security flaw resurfaced in recent weeks after a U.S. senator reported that cybercriminals exploited the Signaling System 7 (SS7) protocol to breach a mobile carrier.
July 18, 2017 Google Advances Two-Step Verification 2 min read - Google is changing how it does two-step verification by replacing one-time SMS codes with new features and login protocols.
Identity & Access September 7, 2016 What’s Wrong With SMS Authentication? Two IBM Experts Weigh In on the NIST Recommendation 4 min read - IBM experts Dustin Hoff and Ashish Malhotra discussed ways for businesses and end users to mitigate security issues stemming from SMS authentication.
August 5, 2016 Venmo Wallet Can Be Drained by SMS Use 2 min read - A security researcher recently discovered how the popular mobile wallet Venmo can be hacked using SMS text messages and certain iOS quirks.
August 1, 2016 New SMS Phishing Campaigns Spotted: Attackers Bobbing for Apples? 2 min read - The latest targets of SMS phishing are iOS users. In fact, more than 7,500 users who clicked on a malicious link fell victim to a recent smishing attack.
July 28, 2016 SMS Two-Factor Authentication: Time to Trash the Text? 2 min read - Just like software or network defense, cybercriminals have found ways to circumvent and compromise SMS two-factor authentication.
Fraud Protection March 19, 2013 Is Your Risk Engine Shortsighted? Improve Its Vision With a Holistic View 3 min read - A firm can face a malware breach if its risk engine does not see every stage of an attack, as one bank recently discovered.