The recent hack of Senator Lindsey Graham’s phone offers a critical case study, revealing how smishing attacks can successfully compromise personal devices with alarming consequences.
The recent hack of Senator Lindsey Graham’s phone offers a critical case study, revealing how smishing attacks can successfully compromise personal devices with alarming consequences.
Millions stolen from US and EU banks could’ve been prevented. According to a recent Ars Technica article, “Researchers from IBM Trusteer say they’ve uncovered a massive fraud operation that used a network of mobile device emulators to drain millions of dollars from online bank accounts in a matter of days. […]
It’s been called the ‘scariest iPhone hack ever.’ According to a recent Ars Technica article, “Earlier this year, Apple patched one of the most breathtaking iPhone vulnerabilities ever: a memory corruption bug in the iOS kernel that gave attackers remote access to the entire device – over Wi-Fi, with no […]
Underestimating the Importance of Mobile Security Suppose one of your business’s employees was out and about one day and her mobile device got hacked. The general consensus would be it’s not exactly a disaster. It’s unlikely that you store your enterprise’s intellectual property on a given employee’s smartphone. It’s not […]