The Latest in IT Security

Posts Tagged ‘mobile security’

Google’s latest annual review of zero-day exploits has claimed known vulnerabilities could be even worse than zero-day vulnerabilities. In its report, Google asks whether zero-days are even needed on Android. Typically, a vulnerability would be most concerning before it becomes public. During this (hopefully short) period, an attacker can execute exploits without having to worry […]

Read more ...

Threat actors are using dedicated mobile Android device spoofing tools to defraud customers of online banking, payment systems, advertising networks and online marketplaces globally. Researchers at Resecurity observed cybercriminals innovating their tactics by employing tools that impersonate compromised account holders and bypass anti-fraud controls. Attackers are using these spoofing tools by exploiting stolen cookie files, […]

Read more ...

Google has released its monthly security updates for the Android operating system, addressing 46 new software vulnerabilities. Among these, three vulnerabilities have been identified as actively exploited in targeted attacks. One of the vulnerabilities tracked as CVE-2023-26083 is a memory leak flaw affecting the Arm Mali GPU driver for Bifrost, Avalon, and Valhall chips. This […]

Read more ...


Categories

MONDAY, MARCH 10, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments