If you’re anything like me, you used delivery more during the pandemic than before. Both getting food brought to my door and meal kit boxes mean people don’t have to…
Browsing CategorySMS
The Story of FakeChat
Starting late December 2020, IBM Trusteer’s mobile threat research lab discovered and began closely tracking a new Android banking malware that appeared to be mostly targeting users in Spain. Per…
What You Need to Know About Scam Text Messages in 2021
The threat of scam text messages may now seem distant, even quaint. With all the new, exotic and sophisticated attacks that have arisen in the past decade, surely text message…
Twitter turns off SMS-based tweeting in most countries
Buh-bye, original way of tweeting. Twitter said it’s to keep our accounts safe, referring to unspecified SMS-enabled vulnerabilities. This post appeared first on Naked Security Blog by Sophos Author: Lisa…
New Android Banking Trojan Targets Spanish, Portuguese Speaking Users
IBM X-Force research recently analyzed a new Android banking Trojan that appears to be targeting users in countries that speak Spanish or Portuguese, namely Spain, Portugal, Brazil and other parts…
Phishers and iPhone Thieves Rolling Out Multimillion-Dollar Operations
IBM X-Force Incident Response and Intelligence Services (IRIS) researchers recently went down the rabbit hole of a physical iPhone theft that was followed by a SMiShing campaign designed to unlock…
“Instant bank fraud” warning spread on WhatsApp is a hoax
No, we don’t know why people start hoaxes like this. You can do your bit by not forwarding them, not even “just in case”. This post appeared first on Naked…
TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany
IBM X-Force researchers recently analyzed an Android malware app that’s likely being pushed to infected users by the TrickBot Trojan. This app, dubbed “TrickMo” by our team, is designed to…
How one man could have flooded your phone with Microsoft spam
What a difference one tiny little character can make to a phone number. This post appeared first on Naked Security Blog by Sophos Author: Paul Ducklin