Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2024-07-29 12:58:06 |
Are Mobile Devices Less Secure than PCs? (lien direct) |
>
Are smartphones less secure than PCs? The answer to that is, they\'re different. They face different security threats. Yet they...
>
Are smartphones less secure than PCs? The answer to that is, they\'re different. They face different security threats. Yet they...
|
Mobile
|
|
★★
|
|
2024-07-11 11:56:57 |
Comment le jailbreaking ou l'enracinement affecte-t-il la sécurité de mon appareil mobile? How Does Jailbreaking Or Rooting Affect My Mobile Device Security? (lien direct) |
>
Dans le monde interconnecté d'aujourd'hui, nos appareils mobiles servent d'outils essentiels pour la communication, la productivité et le divertissement.Cependant, pour certains techniciens ...
>
In today’s interconnected world, our mobile devices serve as essential tools for communication, productivity, and entertainment. However, for some tech-savvy...
|
Tool
Mobile
|
|
★★★
|
|
2024-05-31 21:43:06 |
Fake Bahrain Government Android App vole les données personnelles utilisées pour la fraude financière Fake Bahrain Government Android App Steals Personal Data Used for Financial Fraud (lien direct) |
>
Rédigé par Dexter Shin De nombreuses agences gouvernementales fournissent leurs services en ligne pour la commodité de leurs citoyens.Aussi, si ce ...
>
Authored by Dexter Shin Many government agencies provide their services online for the convenience of their citizens. Also, if this...
|
Mobile
|
|
★★
|
|
2024-04-04 13:54:50 |
Les quatre Rs de la sécurité mobile personnelle The Four Rs of Personal Mobile Security (lien direct) |
>
Les smartphones ont activé un tout nouveau monde numérique, où les applications sont des passerelles à presque n'importe quel service imaginable.Cependant, comme ...
>
Smartphones have enabled a whole new digital world, where apps are gateways to just about any service imaginable. However, like...
|
Mobile
|
|
★★
|
|
2024-03-14 16:42:32 |
Android Phishing Scam utilisant des logiciels malveillants en tant que service en Inde Android Phishing Scam Using Malware-as-a-Service on the Rise in India (lien direct) |
>
Rédigé par Zepeng Chen et Wenfeng Yu McAfee Research Mobile Research a observé une campagne de logiciels malveillants à escroquerie active ciblant Android ...
>
Authored by ZePeng Chen and Wenfeng Yu McAfee Mobile Research Team has observed an active scam malware campaign targeting Android...
|
Malware
Mobile
|
|
★★★
|
|
2024-02-28 08:37:47 |
De l'enfant militaire au marketing de produit: mon voyage McAfee From Military Kid to Product Marketing: My McAfee Journey (lien direct) |
>
Spotlight des employés: Rencontrez Jovohn!Des débuts militaires au champion de la sécurité mobile, rencontrez Jovohn, notre marketing de produit passionné et président du MAHC ....
>
Employee Spotlight: Meet Jovohn! From military beginnings to mobile security champion, meet Jovohn, our passionate Product Marketer and MAHC President....
|
Mobile
|
TYPEFRAME
|
★★
|
|
2024-02-08 07:29:53 |
Moqhao Evolution: les nouvelles variantes commencent automatiquement juste après l'installation MoqHao evolution: New variants start automatically right after installation (lien direct) |
>
Rédigé par Dexter Shin Moqhao est une famille de logiciels malveillants Android bien connue associée au groupe d'actrice de menace Mantis itinérante d'abord ...
>
Authored by Dexter Shin MoqHao is a well-known Android malware family associated with the Roaming Mantis threat actor group first...
|
Threat
Malware
Mobile
|
|
★★
|
|
2023-12-22 19:34:18 |
Backdoor furtive «Android / Xamalicious» infecte activement les appareils Stealth Backdoor “Android/Xamalicious” Actively Infecting Devices (lien direct) |
>
Rédigé par l'équipe de recherche mobile Fernando Ruiz McAfee a identifié une porte dérobée Android implémentée avec Xamarin, un cadre open source qui permet ...
>
Authored by Fernando Ruiz McAfee Mobile Research Team identified an Android backdoor implemented with Xamarin, an open-source framework that allows...
|
Mobile
|
|
★★★
|
|
2023-12-20 15:40:59 |
Boulissant contre le phishing Android dans la banque indienne Shielding Against Android Phishing in Indian Banking (lien direct) |
>
Rédigé par Neil Tyagi et Fernando Ruiz dans un monde en évolution numérique, la commodité de la banque via des applications mobiles a ...
>
Authored by Neil Tyagi and Fernando Ruiz In a digitally evolving world, the convenience of banking through mobile applications has...
|
Mobile
|
|
★★
|
|
2023-11-15 15:09:35 |
Les fausses applications Android et iOS volent des SMS et des contacts en Corée du Sud Fake Android and iOS apps steal SMS and contacts in South Korea (lien direct) |
>
Rédigé par Dexter Shin La plupart des gens ont des smartphones ces jours-ci qui peuvent être utilisés pour rechercher facilement divers sujets ...
>
Authored by Dexter Shin Most people have smartphones these days which can be used to easily search for various topics...
|
Mobile
|
|
★★
|
|
2023-08-04 13:36:07 |
Adware invisible: dévoilement de la fraude publicitaire ciblant les utilisateurs d'Android Invisible Adware: Unveiling Ad Fraud Targeting Android Users (lien direct) |
>
Rendu par Sangryol Ryu, chercheur à menace McAfee, nous vivons dans un monde où les publicités sont partout, et ce n'est pas une surprise ...
>
Authored by SangRyol Ryu, McAfee Threat Researcher We live in a world where advertisements are everywhere, and it’s no surprise...
|
Threat
Mobile
|
|
★★
|
|
2020-12-21 21:32:24 |
(Déjà vu) How A Device to Cloud Architecture Defends Against the SolarWinds Supply Chain Compromise (lien direct) |
In a blog post released 13 Dec 2020, FireEye disclosed that threat actors compromised SolarWinds's Orion IT monitoring and management software with a trojanized version of SoalrWinds.Orion.Core.BusinessLayer.dll delivered as part of a digitally-signed Windows Installer Patch. The trojanized file delivers a backdoor, dubbed SUNBURST by FireEye (and Solorigate by Microsoft), that communicates to third-party servers for […]
|
Threat
Mobile
|
Solardwinds
Solardwinds
|
|
|
2020-12-17 23:27:06 |
Additional Analysis into the SUNBURST Backdoor (lien direct) |
Executive Summary There has been considerable focus on the recent disclosures associated with SolarWinds, and while existing analysis on the broader campaign has resulted in detection against specific IoCs associated with the Sunburst trojan, the focus within the Advanced Threat Research (ATR) team has been to determine the possibility of additional persistence measures. Our analysis […]
|
Threat
Mobile
|
Solardwinds
Solardwinds
|
|