article thumbnail

Phishing campaign leverages Google Translate as camouflage

Security Affairs

Crooks leverage Google Translate service as camouflage on mobile browsers in a phishing campaign aimed at stealing Google account and Facebook credentials. The technique makes it harder to detect the attack on mobile browsers. However, other, more clever attacks fool thousands of people daily, even IT and Security professionals.”

Phishing 109
article thumbnail

Black Hat Video Exclusive: Mobile APTs Redefining Phishing Attacks

Threatpost

Mike Murray, vice president of security intelligence at Lookout, discusses how mobile is redefining phishing, taking it out of the traditional inbox and into SMS and Facebook messages.

Mobile 44
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A week in security (August 9 – August 15)

Malwarebytes

Stay safe, everyone!

article thumbnail

BEST PRACTICES: Mock phishing attacks prep employees to avoid being socially engineered

The Last Watchdog

What’s more, in the internet-centric, consumer-driven world we live in, the lines between work-related duties and personal pursuits, which we increasingly access via our mobile devices, have become hopelessly blurred. We’re easily distracted and we cling to our bad habits.

article thumbnail

Apple Unveils 'Lockdown Mode' to Defend Against Spyware

SecureWorld News

Configuration profiles cannot be installed, and the device cannot enroll into mobile device management (MDM), while Lockdown Mode is turned on. While Apple presents this Lockdown Mode as something that can completely protect a mobile device from a cyberattack, in reality, it's a bit more complicated than that.

Spyware 98
article thumbnail

SHARING INTEL: Here’s why it has become so vital to prioritize the security-proofing of APIs

The Last Watchdog

Indeed, APIs have opened new horizons of cloud services, mobile computing and IoT infrastructure, with much more to come. Yet, in bringing us here, APIs have also spawned a vast new tier of security holes. API vulnerabilities are ubiquitous and multiplying; they’re turning up everywhere.

Big data 240
article thumbnail

Your network is talking. Are you listening? 

Cisco Security

Cisco Secure Network and Cloud Analytics provides a path beyond simply seeing; it is about knowing and gaining actionable, always-on security insights to thwart attackers before they can get any data out. But all this complexity built on cloud, mobility, and IoT can become your greatest asset in the arms race that is network security.