WhatsApp has the honor of being the most popular app on iOS enterprise devices, but also the most blacklisted app on enterprise networks. This is one of the findings of the Appthority Enterprise Mobile Security Pulse Report for Q3 2017; a report put together by scanning millions of devices running the company’s mobile security solutions. The gathered data allowed Appthority insight into the most popular apps...
Read More
An unidentified hacker is attempting to sell information pertaining to more than 6,000 Indian enterprises on a DarkNet forum. Researchers at Seqrite, the enterprise security brand of IT security firm Quick Heal, found an advertisement for the data on DarkNet. As of this writing, whoever is behind the posting is currently offering the information, which includes corporate usernames, passwords, and billing documents, for sale at 15 Bitcoins...
Read More
Whole Foods Market, the supermarket chain acquired recently by Amazon for $13.7 billion, informed customers this week that it has launched an investigation after learning that some of its point-of-sale (PoS) systems may have been hacked. The company has provided only few details as the investigation is ongoing. However, it said the incident appears to impact taprooms and full table-service restaurants located within some of...
Read More
Do you know if your Mac’s low-level firmware is up to date with the latest patches? You might not be able to, researchers say. Apple’s security updates for macOS sometime include patches for serious vulnerabilities in the firmware that runs beneath the operating system. So you might think you’re safe if you keep your OS version up to date, but that’s not always the case....
Read More
There’s an ongoing PayPal Phishing Campaign in the wild which sends HTML attachments that spoof PayPal Forms and request users for sensitive information. This campaign was particularly interesting because the email body was encoded with Unicode characters which look similar to corresponding ASCII Characters. Homographic attacks are usually performed to craft URLs which look like legitimate URLs by substituting some of the ASCII characters with...
Read More