android

Apple Finally Adopts RCS, AI Powered Scams Targeting the Elderly
Tom Eston | | AI, AI-Powered, android, Apple, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Elderly, Episodes, Fraud, google, imessage, Information Security, Infosec, MMS, Podcast, Podcasts, Privacy, RCS, Rich Communication Services, Scams, security, Seniors, SMS, social engineering, technology, Voice Cloning, Weekly Edition
In this episode, Tom shows off AI generated images of a “Lonely and Sad Security Awareness Manager in a Dog Pound” and the humorous outcomes. The conversation shifts to Apple’s upcoming support ...

Okta Hacked Again, Quishing Is The New Phishing, Google Play Protect Real-Time Scanning
Tom Eston | | android, Cyber Security, Cybersecurity, Data breach, Data Privacy, Digital Privacy, Episodes, Fraud, google, Google Play, Google Play Protect, hacked, Information Security, Infosec, Okta, Phishing, Podcast, Podcasts, Privacy, QR code, QR Codes, quishing, Real-time App Analysis, Scams, scanning, security, technology, Weekly Edition
In this episode, we explore the recent Okta breach where hackers obtained sensitive customer data via unauthorized access to the Okta support system. Next, we discuss the emerging threat of “quishing,” a ...

Google Enhances Play Protect to Defend Against Polymorphic Malware
Google is strengthening its Google Play Protect tool with new real-time scanning features that aim to deal with the growing challenge of malicious apps that use polymorphic malware to evade detection. The ...
Security Boulevard

Broken ARM: Mali Malware Pwns Phones
Richi Jennings | | android, ARM, CVE-2023-33200, CVE-2023-34970, CVE-2023-4211, GPU, hardware supply chain, Linux, Mali, open source software supply chain, SB Blogwatch, software supply chain, software supply chain risk, Software Supply Chain risks, software supply chain security, Software Supply Chain Security Risks
Exploited in the wild: Yet more use-after-free vulns in Arm’s Mali GPU driver ...
Security Boulevard

BadBazaar: Chinese Spyware Shams Signal, Telegram Apps
Richi Jennings | | android, android spyware, APT15, BadBazaar, Flygram, google, Google Play Incompetence, Google Play Store, GREF, Lukas Stefanko, Nickel, Samsung, SB Blogwatch, signal, Signal Plus Messenger, spyware, Telegram, Vixen Panda
After sneaking into Google and Samsung app stores, “GREF” APT targets Uyghurs and other PRC minorities ...
Security Boulevard

By Following the Crypto, Cyfirma Identifies Developer Behind CraxsRAT
The person responsible for developing the dangerous CraxsRAT malware that targets Android devices has been operating in Syria for more than eight years and has accumulated at least $75,000 over the last ...
Security Boulevard

Android Foils AirTag Stalkers and Thieves — While Apple Does Nothing
Richi Jennings | | AirTag, android, Apple, Consumer IoT, cyberstalking, geolocation, google, iot, location privacy, Privacy, SB Blogwatch, Stalking
C’mon Cupertino: “Unknown Tracker Detected,” your phone screams. What now? ...
Security Boulevard

The FTC’s Complaint Against Ring, Detecting Malware Infected Apps, America’s Most Cybersecure Companies
Tom Eston | | amazon, America, android, companies, Cyber Security, Cybersecure, Cybersecurity, Data Privacy, Digital Privacy, Episodes, fine, Forebes, FTC, google, Google Play, Hacker Safe, Hackers, Information Security, Infosec, iRecorder, Malicious App, Malware, Mobile, Mobile App, Podcast, Podcasts, Privacy, Ring, security, SecurityScorecard, smartphone, technology, vulnerability, Weekly Edition
The FTC charged Ring, the Amazon-owned home security camera company, for compromising customer privacy and having inadequate security measures. Employees accessed private videos, while hackers exploited vulnerabilities and now Ring needs to ...

‘BrutePrint’ Unlocks Android Phones — Chinese Researchers
Richi Jennings | | android, Authentication, authentication bypass, biometric, biometric authentication, biometric security, biometrics authentication, Biometrics-Based Authentication, BrutePrint, fingerprint, Fingerprint Scanners, fingerprint scanning, fingerprint sensors, fingerprints, iot, Man In The Middle, man in the middle attack, man in the middle attacks, mitm, MitM Attack, mitm attacks, SB Blogwatch, Trusted Execution Environment
Or, at least, OLDER phones: SPI/TEE MITM FAIL ...
Security Boulevard

Arkansas Social Media Consent Law, Android Malware Invasion, New Method of Keyless Car Theft
Tom Eston | | ad fraud, android, Arkansas, Auto Industry, Car manufacturers, Car theft, Child protection, crime, Cyber Security, cyberbullying, Cybersecurity, Data Privacy, Digital Privacy, Episodes, facebook, Google Play Store, Information Security, Infosec, Keyless Entry, malicious apps, Malware, Minors, mobile devices, online safety, Parental consent, Podcast, Podcasts, Privacy, security, social media, technology, Tekya, Vulnerabilities, Weekly Edition
Is Arkansas taking the right step to protect children online? A new law passed in the state makes it illegal for minors to use social media without their parent or guardian’s consent ...