Login

Register

Login

Register

Category

Mobile Featured Stories
As technology companies and the medical community work to find ways to track and test for the virus, privacy might fall by the wayside. In late January and early February, a study of influenza had the ability to reveal whether subjects in the Seattle area were infected by the novel coronavirus. But medical privacy rules...
Read More
Mobility must be included in the security operations workflow so that company data is protected regardless of where remote workers are located. Workplaces continue to expand beyond the walls of the traditional office building and out into unsecured environments, increasingly relying on mobile devices. But as mobile usage increases, so do the security risks. According...
Read More
Attackers are attempting to take advantage of the surge in teleworking prompted by COVID-19, Check Point says. Cybercriminals are setting up numerous fake Zoom domains to try and take advantage of users who want to use the videoconferencing tool to connect with friends, family, and colleagues during the ongoing COVID-19 crisis. Researchers from Check Point...
Read More
As security professionals, it’s easy to get cynical about the continued proliferation of tax ID theft and blame the consumers themselves. But that doesn’t help anyone. We hear about it every year at this time: consumer-targeted phishing scams in which hackers are after tax returns. We’re all well aware of the motivations behind these schemes....
Read More
COVID-19 means many people are doing their jobs from outside the confines of the office. That may not be as easy as it sounds. So, you’re working from home … For a while. You’ve probably worked remotely before, and you’re thinking, “I’ve got this!” Odds are, you’re mistaken. You don’t have this. That’s OK; this...
Read More
Microsoft made several security announcements ahead of RSA Conference, including its decision to bring Microsoft Defender to iOS and Android. Microsoft today announced the general availability of its Threat Protection and Insider Risk Management platforms, as well as the decision to bring Microsoft Defender Advanced Threat Protection to iOS and Android. The announcements come amid...
Read More
Most iOS and Android apps that Cometdocs has published on Google and Apple app stores transmit entire documents – unencrypted. Dozens of popular file management apps published by a popular operator of an online document management system do not encrypt file transfers to and from user devices, potentially exposing data. Mobile security firm Wandera, which...
Read More
Consumers in dozens of countries were targeted, Lookout says. A recent phishing campaign involving the use of SMS messages to lure potential victims into disclosing their bank-account access credentials is the latest evidence of growing attacker interest in users of mobile apps. Lookout, which tracked the threat, Friday described it as impacting mobile users in...
Read More
With more than 80 different schemes for authenticating devices either proposed or implemented, best practices and reference architectures are sorely needed, experts say. The explosion in connected devices has led to a security nightmare for many businesses and providers, as the companies cope with securing a network that no longer connects together just workstations, servers,...
Read More
Shenzhen Hawk Internet Co. is identified as the parent company behind five app developers seeking excessive permissions in Android apps. Security researchers have identified 24 Android applications seeking dangerous and excessive permissions, all of which come from app developers under Chinese company Shenzhen Hawk Internet Co., Ltd., and have a combined total of 382 million...
Read More
Some 93% of all mobile transactions across 20 countries were blocked as fraudulent, Upstream says. Criminal groups are increasingly targeting users of Android mobile devices with malware for conducting ad fraud on a massive scale. Mobile security vendor Upstream this week said that in 2019 it identified as many as 98,000 malicious Android apps and...
Read More
Shqip Shqip አማርኛ አማርኛ العربية العربية English English Français Français Deutsch Deutsch Português Português Русский Русский Español Español

National Cyber Security Consulting App

 https://apps.apple.com/us/app/id1521390354

https://play.google.com/store/apps/details?id=nationalcybersecuritycom.wpapp


NATIONAL CYBER SECURITY RADIO
HACKER FOR HIRE MURDERS
 

ALEXA “OPEN NATIONAL CYBER SECURITY RADIO”

National Cyber Security Radio (Podcast) is now available for Alexa.  If you don't have an Alexa device, you can download the Alexa App for free for Google and Apple devices.   

nationalcybersecurity.com

FREE
VIEW