AT&T becomes first big mobile carrier to accept Bitcoin payments

Credit to Author: Lucas Mearian| Date: Fri, 24 May 2019 09:47:00 -0700

AT&T will allow customers to pay their mobile bills using Bitcoin, adding its name to a short list of major businesses and government agencies that allow the blockchain-based cryptocurrency to be used as a form of payment.

While not directly accepting cryptocurrency, AT&T is the first major U.S. mobile carrier to let customers pay in Bitcoin through a third-party service provider.

Customers using its online bill pay service or the myAT&T app will be able to choose BitPay, a cryptocurrency payment processor for payments. The customer pays in Bitcoin and BitPay verifies the funds and accepts the Bitcoin on behalf of the business.

To read this article in full, please click here

Read more

Do Apple devices need anti-virus software?

Credit to Author: Jonny Evans| Date: Thu, 16 May 2019 06:03:00 -0700

Apple’s devices are far better defended against malware and viruses than other platforms, but does this mean they don’t need anti-virus software?

No, yes and maybe

I’ve lost track of the number of times Mac users have told me Macs don’t need virus protection because they are inherently more robust against such attacks.

I’ve also lost count of how many security researchers have said that Apple devices are becoming more liable to being attacked as their market share grows.

Both are right. Both are wrong.

To read this article in full, please click here

Read more

WhatsApp fix goes live after targeted attack on human rights lawyer

Credit to Author: Christopher Boyd| Date: Tue, 14 May 2019 16:46:21 +0000

A fix was rolled out for a WhatsApp vulnerability, which was used to inject spyware into mobile devices and target a human rights lawyer.

Categories:

Tags:

(Read more…)

The post WhatsApp fix goes live after targeted attack on human rights lawyer appeared first on Malwarebytes Labs.

Read more

The iPhone user's guide to the WhatsApp hack attack

Credit to Author: Jonny Evans| Date: Tue, 14 May 2019 08:17:00 -0700

Hackers have used a security bug inside WhatsApp to install spyware through an infected WhatsApp voice call, and Apple users are affected.

What you need to do

If you are one of the 1.5 billion people who use WhatsApp you should immediately update both your app and your iOS software to the latest version.

The app update includes fixes that should prevent hackers taking over your iPhone, while future Apple updates will also likely address these flaws.

What is the threat?

Israeli hackers from a company called the NSO Group developed the spyware specifically so they could get into people’s devices.

To read this article in full, please click here

Read more

No, Google, Apple's privacy is not a luxury item

Credit to Author: Jonny Evans| Date: Thu, 09 May 2019 06:10:00 -0700

Why is privacy a luxury? Possibly because surveillance capitalist firms have subsidized product prices by collecting and trading in the personal data of the people that use their products, enabling them to sell hardware cheap.

The consequences of convenience

The crux of Google CEO Sundar Pichai’s argument against firms such as (obviously including but never named) Apple is that his company offers convenience in exchange for personal secrets, makes its services available for free, and has a “profound commitment” to protecting user privacy.

To read this article in full, please click here

Read more

The SAP/Apple partnership changes everything

Credit to Author: Jonny Evans| Date: Wed, 08 May 2019 06:11:00 -0700

SAP and Apple are working together to help businesses build applications that use Apple’s machine learning and augmented reality technologies.

Apple is the enterprise

Apple CEO Tim Cook joined SAP CEO Bill McDermott at the latter company’s SAPPHIRE conference to announce the news.

“A man who is the last to accept the status quo, and the first to change it,” said McDermott introducing Cook.

Since entering into a business app development partnership with Apple in 2016, SAP itself has become an increasingly Apple-based business with around 100,000 Apple devices in use across the company.

That’s a revealing statistic, given Cook’s admission:

To read this article in full, please click here

Read more

Google, Hyperledger launch online identity management tools

Credit to Author: Lucas Mearian| Date: Mon, 15 Apr 2019 03:00:00 -0700

Read more

Fake Instagram assistance apps found on Google Play are stealing passwords

Credit to Author: Nathan Collier| Date: Fri, 12 Apr 2019 17:40:55 +0000

We all want those Instagram likes and followers. But what if the app that’s supposed to be assisting you is also stealing your username and password? As a matter of fact, that’s exactly what we found in three fake Instagram assistance apps found on Google Play.

Categories:

Tags:

(Read more…)

The post Fake Instagram assistance apps found on Google Play are stealing passwords appeared first on Malwarebytes Labs.

Read more

Massive bank app security holes: You might want to go back to that money under the mattress tactic

Credit to Author: Evan Schuman| Date: Fri, 05 Apr 2019 10:24:00 -0700

A new report from a well-regarded payments consulting firm has found a lengthy list of security insanity while examining several major fintech company mobile apps. Although the very nature of apps that manage and move money would suggest presumably strong security, banks and their cohorts tend to adopt new technology slower than almost any other vertical, which puts them in a bad place when it comes to security.

My favorite finding from the Aite Group report: “Several mobile banking apps hard-coded private certificates and API keys into their apps. [Thieves] could exploit this by copying the private certificates to their computers and running any number of free password-cracking programs against them,” the report noted. “Should the [attackers] successfully crack the private key, they would be able to decrypt all communication between the back-end servers and mobile devices, among other things. The API keys allow an adversary to then begin targeting the [financial institution’s] API servers, gaining them access to data in the back-end databases. This allows [attackers] to authenticate the device with the back-end servers of that app, since this is what APIs use for authentication and authorization.”

To read this article in full, please click here

Read more

A week in security (March 25 – 31)

Credit to Author: Malwarebytes Labs| Date: Mon, 01 Apr 2019 08:24:19 +0000

A roundup of news stories from March 25 – 31, including phishing, hacking, Government studies, mobile dangers on official stores and more.

Categories:

Tags:

(Read more…)

The post A week in security (March 25 – 31) appeared first on Malwarebytes Labs.

Read more