Diversifying Defenses: FjordPhantom Malware Shows Importance of a Multi-Pronged Approach

Security teams need to combine the angles of client-side and server-side detection in order to have the best chance of mitigating the risk of advanced mobile malware.
The post Diversifying Defenses: FjordPhantom Malware Shows Importance of a Multi-Pron… Continue reading Diversifying Defenses: FjordPhantom Malware Shows Importance of a Multi-Pronged Approach

Mysterious ‘MMS Fingerprint’ Hack Used by Spyware Firm NSO Group Revealed

The existence of a previously unknown infection technique used by spyware firm NSO Group is suggested by a single line in a contract between NSO and the telecom regulator of Ghana.
The post Mysterious ‘MMS Fingerprint’ Hack Used by Spyware Firm NSO Gro… Continue reading Mysterious ‘MMS Fingerprint’ Hack Used by Spyware Firm NSO Group Revealed

New Wi-Fi Authentication Bypass Flaws Expose Home, Enterprise Networks

A couple of Wi-Fi authentication bypass vulnerabilities found in open source software can expose enterprise and home networks to attacks.
The post New Wi-Fi Authentication Bypass Flaws Expose Home, Enterprise Networks appeared first on SecurityWeek.
Continue reading New Wi-Fi Authentication Bypass Flaws Expose Home, Enterprise Networks

At Least 30 Journalists, Lawyers and Activists Hacked With Pegasus in Jordan, Forensic Probe Finds

Pegasus spyware from NSO Group was used in Jordan to hack the cellphones of journalists, lawyers, human rights and political activists.
The post At Least 30 Journalists, Lawyers and Activists Hacked With Pegasus in Jordan, Forensic Probe Finds appeared… Continue reading At Least 30 Journalists, Lawyers and Activists Hacked With Pegasus in Jordan, Forensic Probe Finds