Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Mobile

9 Best Android Vulnerability Scanners to Detect Vulnerabilities

In the digital age, Android vulnerability scanners, or as some may call them, android app vulnerability scanners, have become an essential tool for maintaining the security of mobile applications. Given Android’s substantial mobile OS market share, it’s a prime target for cyber threats.

Keeper Security Introduces Major UI Update for Android

Keeper Security is excited to announce a significant update to our Android app that we think users will love. This update is heavily focused on bringing the same fresh, modern look to our Android user interface that our Web and Desktop received earlier this year and iOS just last month. The highly anticipated release incorporates improved usability and a distinctly light and modern theme.

BLASTPASS: Government agencies told to secure iPhones against spyware attacks

CISA, the United States's Cybersecurity and Infrastructure Security Agency, has ordered federal agencies to patch their iPhones against vulnerabilities that can be used as part of a zero-click attack to install spyware from the notorious NSO Group.

Can Someone Guess My Password From the Wi-Fi Signal On My Phone?

Cybercriminals can't ascertain your phone password just from a Wi-Fi signal, but they can come close according to a method described in a recent research paper. Researchers have demonstrated a method that uses Wi-Fi signals to infer numerical passwords, and the mechanics behind it are nothing short of intriguing. Side-channel attacks often remind me of James Bond-like espionage. So does a research paper that is to appear at ACM CCS later this year.

New Vulnerabilities in Apple Products Exploited in the Wild

On September 7, 2023, Apple released emergency security updates to fix a buffer overflow vulnerability (CVE-2023-41064) and a validation issue vulnerability (CVE-2023-41061) among macOS, iOS, iPadOS, and watchOS products. These vulnerabilities can be exploited with a maliciously crafted attachment or image which leads to arbitrary code execution.

CISO's Corner: Cybersecurity Best Practices: Securing Employee Smartphones

Arguably, the most used device by an organization’s employees is their smartphone. Ensuring that anyone, from the CEO to a newcomer being onboarded, knows how to keep this device safe should be paramount. Why? Globally, more than 2 million attacks on mobile devices are reported each month, according to Statista. While the number of attacks has dropped precipitously from its peak of 6.5 million in October 2020, it is still dangerously high and a favorite threat actor attack vector.

Reading Made Mobile: Step-by-Step Guide to Access Z Library on Your Phone for Free

Reading on the go has become the norm. Whether commuting, traveling, or simply lounging on your couch, accessing a library on your phone allows you to dive into a world of countless books. And with the help of Z Library, you can explore a vast collection of e-books across various genres. This user-friendly platform allows you to search for books, download them, and customize your reading experience. The best part? It's completely free!

Cyber Criminals Targeting Victims Through Beta-Testing Apps

Cybercriminals use a variety of deceptive methods to defraud their victims. It can be challenging to keep up-to-date with the latest threats to your online security. The Federal Bureau of Investigation (FBI) has warned people about the dangers of a new threat - malicious beta-testing apps. These apps can have severe consequences for our data and finances. In this article, we'll explain how this latest attack works, the signs of a malicious app you need to be aware of, and, most importantly, what cybersecurity tools you need to protect yourself.

Best 7 Android Pentesting Tools for 2023 [Reviewed]

In an era where mobile applications are a crucial part of our daily lives, the security of these applications, especially Android apps, has become paramount. As per a report by Statista, in 2022, there were 1802 data breaches in the United States, with over 422.14 million individuals affected.