The Latest in IT Security

1

Threat actors are using dedicated mobile Android device spoofing tools to defraud customers of online banking, payment systems, advertising networks and online marketplaces globally. Researchers at Resecurity observed cybercriminals innovating their tactics by employing tools that impersonate compromised account holders and bypass anti-fraud controls. Attackers are using these spoofing tools by exploiting stolen cookie files, […]

Read more ...

1

Google has released its monthly security updates for the Android operating system, addressing 46 new software vulnerabilities. Among these, three vulnerabilities have been identified as actively exploited in targeted attacks. One of the vulnerabilities tracked as CVE-2023-26083 is a memory leak flaw affecting the Arm Mali GPU driver for Bifrost, Avalon, and Valhall chips. This […]

Read more ...

1

In today’s interconnected world, mobile devices have become an integral part of our lives, enabling seamless communication, productivity, and access to sensitive information. However, as reliance on mobile technology grows, so does the risk of cyber threats targeting these devices. A recent surge in sophisticated attacks against mobile devices has raised concerns among cybersecurity experts. […]

Read more ...


Categories

THURSDAY, MAY 15, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments