Mobile

Devil-Traff: A New Bulk SMS Platform Driving Phishing Campaigns
Daniel Kelley | | Mobile, Mobile Phishing, Mobile Phishing Protection, Phishing, Phishing Attacks, smishing, social engineering
Employees in most organizations receive countless communications daily—emails, Slack messages, or ticket updates, for example. Hidden among these routine interactions are phishing scams designed to exploit trust and compromise security. Imagine an ...

Devil-Traff: A New Bulk SMS Platform Driving Phishing Campaigns
Daniel Kelley | | Mobile, Mobile Phishing, Mobile Phishing Protection, Phishing, Phishing Attacks, smishing, social engineering
Employees in most organizations receive countless communications daily—emails, Slack messages, or ticket updates, for example. Hidden among these routine interactions are phishing scams designed to exploit trust and compromise security. Imagine an ...

Reflecting on Y2K: Lessons for the Next Tech Crisis and AI Safety
Tom Eston | | AI, AI Risks, AI safety, Apple, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Happy New Year, Information Security, Infosec, ios, iPhone, Mobile, New Year, Podcast, podcasting, Podcasts, Privacy, security, Smart Phone, Stolen Device Protection, technology, Weekly Edition, Y2K
Join us as we reminisce about Y2K, the panic, the preparations, and the lessons learned 25 years later. We also discuss the implications for future technology like AI and potential cybersecurity crises ...

Digital License Plate Vulnerabilities, How to Avoid New Text Message Scams
Tom Eston | | cars, Cyber Security, cyber threat, Cybersecurity, Data Privacy, digital license plate, Digital Privacy, driving, Episodes, Fraud, Information Security, Infosec, license, License Plate, Mobile, mobile phone, Number Warming, Phishing, Podcast, Podcasts, Privacy, Scams, security, Smart Phone, social engineering, technology, Text Message, text message scam, Weekly Edition
In this episode Tom, Scott, and Kevin discuss the vulnerabilities of digital license plates and the potential for hackers to exploit them. They explain what digital license plates are and how they ...

iPhone Mirroring Flaw Could Expose Employee Personal Information
A flaw in Apple's mirroring feature within the iOS 18 and macOS Sequoia software updates compromises personal privacy when used on work Macs, according to a report from Sevco Security ...
Security Boulevard

How Mobile ID Verification is Shaping the Future of Digital Payments
Integrating mobile ID verification into digital payment systems marks a significant milestone in the evolution of digital commerce ...
Security Boulevard

The Evolution of Phishing Attacks: Beyond Email and How to Protect Your Organization
Jimmy Lin | SlashNext Threat Lab | | AI, bec, Browser Phishing Protection, Browser protection, business email compromise, cyberthreats, Email Protection, executive impersonation, generative AI, generative ai gen ai, Mobile, Mobile Phishing Protection, Product, smishing
The Evolution of Phishing Attacks: Beyond Email Phishing attacks have long been synonymous with email, but the landscape of cyberthreats has evolved dramatically. Today, phishing is not confined to email inboxes; it ...

The Evolution of Phishing Attacks: Beyond Email and How to Protect Your Organization
Barry Strauss | | AI, bec, Browser Phishing Protection, Browser protection, business email compromise, cyberthreats, Email Protection, executive impersonation, generative AI, generative ai gen ai, Mobile, Mobile Phishing Protection, Product, smishing
The Evolution of Phishing Attacks: Beyond Email Phishing attacks have long been synonymous with email, but the landscape of cyberthreats has evolved dramatically. Today, phishing is not confined to email inboxes; it ...

Sophisticated Smishing Compromises Employee Accounts, Accesses Corporate Gift Card Systems
Stephen Kowski | | CTO Corner, Cybersecurity, cyberthreats, gift card scams, Mobile, Phishing, smishing, social engineering, social engineering scams
We at SlashNext want to draw attention to the alarming trend of cybercriminals exploiting advanced techniques to target retail corporations, as highlighted in the recent FBI Private Industry Notification (PIN). The threat ...

FCC Fines Wireless Carriers $200 million, Google’s Fight Against Malicious Apps
Tom Eston | | apps, ATT, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, fcc, fines, google, Google Play Store, Information Security, Infosec, location data, malicious apps, Mobile, Play Store, Podcast, Podcasts, Privacy, security, T-Mobile, technology, User Location Data, verizon, Weekly Edition, wireless
In episode 328, Tom and Kevin discuss two major cybersecurity and privacy news stories. The first topic covers the FCC issuing fines to major US wireless carriers for sharing users’ real-time location ...