Categories
IT Security Outsourced IT

SIM-Swapping Attack

What is a SIM-Swapping Attack? SIM swapping, sometimes called SIM hijacking, occurs when a device tied to a customer’s phone number is fraudulently manipulated. Cyberattackers usually employ SIM swapping as a way to receive one-time security codes from banks, cryptocurrency exchanges, and other financial institutions. A study by Princeton University found that four-fifths of SIM-swap […]

Categories
Application Security IT Security

iPhone Calendar Viruses

What are iPhone Calendar Viruses? Over the last few years, cyberattackers have been increasingly targeting the iPhone calendar app in an attack known as “calendar spam.” In these attacks, iPhone users have reported that their calendars have been filling up with strange appointments, reminders, and other junk events that are often pornographic or contain warnings […]

Categories
IT Security Outsourced IT

Jailbreaking and Rooting Mobile Devices

What are Jailbroken and Rooted Mobile Devices? Jailbreaking and rooting refer to removing software restrictions that are intentionally put in place by the manufacturer in order to access more applications and/or features. Jailbreaking is the term for this process as it happens on an Apple device, while rooting refers to this process as it happens […]

Categories
Application Security IT Security Outsourced IT

Mobile Phishing

What is Mobile Phishing? Phishing cyberattacks are increasingly targeting mobile devices, as these types of cyberattacks are effective and relatively simple to launch. In a mobile phishing cyberattack, the cyberattacker may harvest credentials to gain access to corporate or personal resources. Corporate access can be used for stealing personal data, and personal access can also […]

Categories
Application Security IT Security Outsourced IT

Location-Based Services

What are Location-Based Services? Location-based services (LBS) use real-time geolocation data from mobile devices to provide information, security, and/or entertainment. Using a mobile device, even powering it on, exposes location data.1 Mobile devices connect to cellular providers and networks, and when they do the cellular provider receives real-time location information. This information can be used […]