New Android Malware Channels Malicious Activity Through Accessibility Services
Security researchers uncovered a new Android malware strain called “DEFENSOR ID” that channels its malicious activity through a device’s Accessibility Services. In its analysis, ESET observed DEFENSOR...
View ArticleDiscord Client Modified to Steal Users’ Plaintext Passwords
Security researchers observed the “AnarchyGrabber3” malware modifying the Discord client to steal its victims’ plaintext passwords. As reported by Bleeping Computer, a threat actor released a new...
View Article#TwitterHack: Power, Privilege and Pandemic
On Wednesday, July 15, the Twitterverse was ablaze with what Twitter itself has described as a “coordinated social engineering attack” that was launched at around 4pm ET. The outcome of this breach...
View ArticleBeyond Text Messages: How to Secure 2FA Against Phone Authentication Scams
If you or your employees access protected information with authentication codes sent to a cell phone, you might want to rethink your plan. Two-factor authentication (2FA) using text messages can fall...
View ArticleDoes Multifactor Authentication Keep Your Remote Workers Safe?
Your eight-character password can be cracked in about eight hours, using brute force attacks — even if you add in numbers, mix up the cases and throw in a special character or three. Odds are high...
View ArticleHow to Fix the Big Problems With Two-Factor and Multifactor Authentication
Getting a second opinion is a great idea in both medicine and end-user cybersecurity. Two-factor authentication (2FA) and multifactor authentication (MFA) are powerful tools in the fight against all...
View ArticleOver 1,200 phishing kits found in the wild with ability to Steal 2FA codes
Academics discovered more than 1,200 phishing kits equipped with the ability to intercept users’ two-factor authentication (2FA) codes in the wild. Two types of 2FA phishing As noted by researchers...
View ArticleThe cybersecurity takeaway from Twitter’s verification chaos
Twitter has been verifiably bonkers since electric car and rocket mogul Elon Musk took over and reworked the social network’s long-standing verification system. This provides a valuable lesson about...
View ArticleIs it time to start hiding your work emails?
In this digital age, it is increasingly important for businesses to be aware of their online presence and data security. Many companies have already implemented measures such as two-factor...
View ArticleAre Meta and Twitter making cybersecurity less accessible?
Customers pay for additional features along with their purchases all the time. You can upgrade a car’s seats from fabric to leather, or pay for more analytics on a marketing automation platform. But...
View Article