Online payment fraud attempts see 73% increase

Online payment fraud attempts increased by 73 percent in 2019, according to a report from Sift. Additional findings in the report reveal that cybercriminals are using mobile devices more than desktops or laptops to commit payment fraud. In fact, though… Continue reading Online payment fraud attempts see 73% increase

What Is Rich Communication Services? Breaking Down the Benefits and Security Risks

Texting has been available since the 1990s, and it has served us well. Now, Rich Communication Services is here. What kinds of security vulnerabilities are associated with this new tech?

The post What Is Rich Communication Services? Breaking Down the Benefits and Security Risks appeared first on Security Intelligence.

Continue reading What Is Rich Communication Services? Breaking Down the Benefits and Security Risks

Researchers use ultrasound waves vibrating through tables to access cellphones

Ultrasonic waves don’t make a sound, but they can still activate Siri on your cellphone and have it make calls, take images or read the contents of a text to a stranger. All without the phone owner’s knowledge. Ning Zhang, assistant profess… Continue reading Researchers use ultrasound waves vibrating through tables to access cellphones

What is driving the machine identity crisis?

Every machine needs a unique identity in order to authenticate itself and communicate securely with other machines. This requirement is radically changing the definition of machines—from traditional physical devices, like laptops and servers, to virtua… Continue reading What is driving the machine identity crisis?

Stalkerware Attacks Increased 50 Percent Last Year, Report

Research puts the emerging mobile threat—which monitors the whereabouts and device activity of devices users as well as collects personal data—into clearer focus. Continue reading Stalkerware Attacks Increased 50 Percent Last Year, Report

Combat complexity to prevent cybersecurity fatigue

In today’s security landscape, the average company uses more than 20 security technologies. While vendor consolidation is steadily increasing with 86 percent of organizations using between 1 and 20 cybersecurity vendors, more than 20 percent feel that … Continue reading Combat complexity to prevent cybersecurity fatigue

Sen. Schumer Pushes for TSA Employee Ban on TikTok App at Work

The Department of Homeland Security and two U.S. military branches already had discontinued use of the app based on concerns over Chinese data-security and censorship practices. Continue reading Sen. Schumer Pushes for TSA Employee Ban on TikTok App at Work

By exploiting an LTE vulnerability, attackers can impersonate mobile phone users

Exploiting a vulnerability in the mobile communication standard LTE, researchers at Ruhr-Universität Bochum can impersonate mobile phone users. Consequently, they can book fee-based services in their name that are paid for via the mobile phone bill &#8… Continue reading By exploiting an LTE vulnerability, attackers can impersonate mobile phone users

Artificial Intelligence (AI) and Security: A Match Made in the SOC

When security analysts partner with artificial intelligence, the benefits include increased productivity, improved job satisfaction, and streamlined threat detection, investigation and response.

The post Artificial Intelligence (AI) and Security: A Match Made in the SOC appeared first on Security Intelligence.

Continue reading Artificial Intelligence (AI) and Security: A Match Made in the SOC

Mobile data roaming traffic generated by consumer and IoT devices expected to surge

Mobile data roaming traffic generated by consumer and IoT devices reached 737 Petabytes in 2019, according to Kaleido Intelligence. This is forecast to reach 2,000 Petabytes in 2024, representing an average annual growth of 22% over the period. Leading… Continue reading Mobile data roaming traffic generated by consumer and IoT devices expected to surge