article thumbnail

Pairwise Authentication of Humans

Schneier on Security

If the code matches what Alice has on her own phone, then Alice has more confidence that she is speaking with the real Bob.

article thumbnail

Mobile malware evolution in 2024

SecureList

million attacks involving malware, adware or unwanted mobile software were prevented. Adware, the most common mobile threat, accounted for 35% of total detections. million malicious and potentially unwanted installation packages were detected, almost 69,000 of which associated with mobile banking Trojans. A total of 1.1

Mobile 116
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Detecting Pegasus Infections

Schneier on Security

The company’s Mobile Threat Hunting feature uses a combination of malware signature-based detection, heuristics, and machine learning to look for anomalies in iOS and Android device activity or telltale signs of spyware infection. This tool seems to do a pretty good job. Free users can use the tool once a month.

Spyware 346
article thumbnail

Hackers Use Malicious PDFs, pose as USPS in Mobile Phishing Scam

Security Boulevard

Postal Service, in phishing campaign targeting mobile device users in hope that victims will divulge credentials and personal information, Zimperium researchers say. The post Hackers Use Malicious PDFs, pose as USPS in Mobile Phishing Scam appeared first on Security Boulevard.

Mobile 116
article thumbnail

T-Mobile is one of the victims of the massive Chinese breach of telecom firms

Security Affairs

T-Mobile confirmed being a victim of recent hacking campaigns linked to China-based threat actors targeting telecom companies. T-Mobile confirms it was hacked as part of a long-running cyber espionage campaign targeting Telco companies. The bad news is that this isn’t the first incident suffered by T-Mobile.

Mobile 112
article thumbnail

T-Mobile detected network intrusion attempts and blocked them

Security Affairs

T-Mobile reported recent infiltration attempts but pointed out that threat actors had no access to its systems and no sensitive data was compromised. T-Mobile detected recent infiltration attempts but confirmed no unauthorized system access occurred, and no sensitive data was compromised. This is not the case at T-Mobile.”

Mobile 115
article thumbnail

NSO Group Spies on People on Behalf of Governments

Schneier on Security

Legal documents released in ongoing US litigation between NSO Group and WhatsApp have revealed for the first time that the Israeli cyberweapons maker ­ and not its government customers ­ is the party that “installs and extracts” information from mobile phones targeted by the company’s hacking software.