Virtual kidnapping scam strikes again. Spot the signs

Categories: News

Tags: virtual kidnapping

Tags: kidnap

Tags: scam

Tags: fake

Tags: fraud

Tags: ransom

Tags: victim

Tags: wire transfer

Tags: digital payment

Tags: venmo

Tags: cashapp

Tags: social engineering

Tags: phone call

Tags: mobile

Tags: relative

A recent scam has been making the rounds that attempts to fool you into thinking a loved one has been kidnapped.

(Read more…)

The post Virtual kidnapping scam strikes again. Spot the signs appeared first on Malwarebytes Labs.

Read more

Microsoft calls time out on Apple Watch Authenticator

Using an Apple Watch as a device to authenticate access to enterprise sites and services using Microsoft Authenticator is a convenience that’s about to go away. Microsoft says the feature will stop working after an Authenticator update scheduled for next month.

Apple Watch auth out

Microsoft Authenticator makes it easy to sign into Microsoft accounts, supported apps or services using two-step verification. Authenticator also generates one-time use codes, so you needn’t wait for text messages or calls to access your accounts.

To read this article in full, please click here

Read more

Hive Social pulls the plug on itself after security flaws found

Categories: News

Tags: Hive social

Tags: app

Tags: mobile

Tags: social media

Tags: socmed

Tags: mastodon

Tags: twitter

Tags: security

Hive was taken offline last Wednesday, after researchers found security issues which could have had major ramifications for service users.

(Read more…)

The post Hive Social pulls the plug on itself after security flaws found appeared first on Malwarebytes Labs.

Read more

Biometrics are even less accurate than we thought

Credit to Author: eschuman@thecontentfirm.com| Date: Mon, 05 Dec 2022 09:43:00 -0800

Biometrics is supposed to be one of the underpinnings of a modern authentication system. But many biometric implementations (whether that be fingerprint scanes or face recognition) can be wildly inaccurate, and the only universally positive thing to say about them is they’re better than nothing.

Also — and this may prove critical — the fact that biometrics are falsely seen as being very accurate may be sufficient to dissuade some fraud attempts. 

There are a variety of practical reasons biometrics don’t work well in the real world, and a recent post by a cybersecurity specialist at KnowBe4, a security awareness training vendor, adds a new layer of complexity to the biometrics issue.

To read this article in full, please click here

Read more

AWS brings Verified Access security to the Apple enterprise

Read more

The future of security: smarter devices that protect themselves

Read more

Why Macs and iPhones should avoid installing 'orphan' apps

There are many reasons any business with a connected fleet of tech products needs robust security policies in place. But the need to protect the enterprise against vulnerabilities inherited with third-party software must be among the biggest motivators. While I shouldn’t need to convince Computerworld readers to keep things locked down, I want to reprise two recent reports to reinforce the warning.

Half of all macOS malware comes from one app

Elastic Security Labs (via 9to5Mac) recently estimated that half of all macOS malware is installed as a result of poor management of the MacKeeper utility app. The report said almost 50% of Mac malware arrives through its installation.

To read this article in full, please click here

Read more

Do you really know what’s inside your iOS and Android apps?

It’s time to audit your code, as it appears that some no/low code features used in iOS or Android apps may not be as secure as you thought. That’s the big take away from a report explaining that disguised Russian software is being used in apps from the US Army, CDC, the UK Labour party, and other entities.

When Washington becomes Siberia

What’s at issue is that code developed by a company called Pushwoosh has been deployed within thousands of apps from thousands of entities. These include the Centers for Disease Control and Prevention (CDC), which claims it was led to believe Pushwoosh was based in Washington when the developer is, in fact, based in Siberia, Reuters explains. A visit to the Pushwoosh Twitter feed shows the company claiming to be based in Washington, DC.

To read this article in full, please click here

Read more