article thumbnail

A bug in the Walgreens mobile app leaked customers’ messages

Security Affairs

Pharmacy store chain Walgreens has disclosed a data breach that impacted some customers of its mobile application. Pharmacy store chain Walgreens has disclosed a data breach that impacted some customers of its mobile application. SecurityAffairs – mobile app, data leak). Pierluigi Paganini.

Mobile 141
article thumbnail

NY Man Pleads Guilty in $20 Million SIM Swap Theft

Krebs on Security

Nicholas Truglia was part of a group alleged to have stolen more than $100 million from cryptocurrency investors using fraudulent “SIM swaps,” scams in which identity thieves hijack a target’s mobile phone number and use that to wrest control over the victim’s online identities. Nicholas Truglia, holding bottle.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Redesigning UI - The Duo Mobile App, What’s New

Duo's Security Blog

In early 2019, we embarked on a project to improve the Duo Mobile user authentication experience. It was a daunting task, considering we haven’t changed the Duo Mobile application in over seven years. Mobile apps can be invasive and users are rightfully wary of granting new apps permissions on their phone.

Mobile 105
article thumbnail

Malwarebytes consumer product roundup: The latest

Malwarebytes

These days, our products don’t just protect you from malware, we protect your identity, defend you from ads, safeguard your social media, and keep your mobile safe too. Mobile Security Whether you’re on iOS or Android, our Mobile Security app just got an upgrade. Are you making the most of them?

article thumbnail

Unmasking 2024’s Email Security Landscape

Security Affairs

Mobile Threats: The expansion of mobile threats highlights the growing need for security awareness among mobile users, particularly as attackers develop more sophisticated methods to compromise personal and corporate data.

Phishing 136
article thumbnail

Black Friday and Cyber Weekend: Navigating the Tumultuous Waters of Retail Cybersecurity

Thales Cloud Protection & Licensing

Thus, investing in state-of-the-art cloud security solutions that simplify data protection becomes not just a best practice but an imperative. The Indispensable Role of End-to-End Encryption in the Age of Mobile Wallets Mobile wallets and online transactions are now as commonplace as physical cash transactions.

Retail 83
article thumbnail

The outstanding stealth of Operation Triangulation

SecureList

Specifically, it: Removes crash logs from the /private/var/mobile/Library/Logs/CrashReporter directory that could have been created during the exploitation process; Searches for traces of the malicious iMessage attachment in various databases, such as ids-pub-id.db those in the /var/mobile/Library/Logs/CrashReporter); Database files (e.g.