What unique identifiers I should use for android and ios application to have proper mobile device identification? [on hold]

I read about some android malware that can basically get info about user mobile device, but when trying to make sure the intended user using the application from the onboarded mobile device, what are the unique identifiers to… Continue reading What unique identifiers I should use for android and ios application to have proper mobile device identification? [on hold]

How an ISP can detect if someone having a WhatsApp call or video call? without detecting or blocking the rest of the app

I am asking the questions because of the latest news: https://www.bbc.com/news/world-middle-east-50095448

I wonder how the ISP can detect the use of call and video calls, without detecting or blocking the rest of the app?
Continue reading How an ISP can detect if someone having a WhatsApp call or video call? without detecting or blocking the rest of the app

Is fileless malware is a new type of attack or the media just bringing them now more to our attention to promote sales of related "new" solutions?

I feel there are so many articles talking about fileless malware, so I was trying to understand is it a new type of attack or those articles are just kind of promoting new cyber solutions?

Continue reading Is fileless malware is a new type of attack or the media just bringing them now more to our attention to promote sales of related "new" solutions?

How can I explain our system admins that AV can’t protect our enterprise machines from attacks leverage on USBninja?

Was hoping to get your support to help to explain to our system admins how come the AV can’t protect our enterprise from attacks that can be generated from USBninja. How can I explain our system admins that AV can’t protect o… Continue reading How can I explain our system admins that AV can’t protect our enterprise machines from attacks leverage on USBninja?