In this section, we talk about the newest information about mobile attacks, such as new risks, security holes, and ways to attack mobile devices. Keep up with the latest security holes, new malware, and the best ways to keep your data and information safe on your phone. Our coverage tells you important things about how mobile security is changing and how to protect yourself from these new threats.
Threat actors are exploiting a new cash-out tactic called "Ghost Tap" to siphon funds from stolen credit card details linked…
The HookBot malware family employs overlay attacks to trick users into revealing sensitive information by impersonating various brands and apps…
Recent analysis has revealed a concerning trend in mobile app security: Many popular apps store hardcoded and unencrypted cloud service…
The eight Android and iOS apps fail to adequately protect user data, which transmits sensitive information, such as device details,…
Threat actors often attack dating apps to steal personal data, including sensitive data and location details, which can be used…
A SIM Swap Scam or SIM Cloning Scam exploits a vulnerability in a two-factor authentication (2FA) system that relies on…
The ongoing "free wedding invite" scam is one of several innovative campaigns aimed at the senior population. Through social media…
In a pivotal decision on November 15, 2023, the Federal Communications Commission (FCC) orchestrated a formidable defensive strategy against insidious…
According to recent reports, Arabic-speaking Android users have been targeted with spyware by the "Arid Viper" threat actor, also known…
The mobile application of T-Mobile has recently been a cause of concern among its customers due to issues concerning privacy.…