article thumbnail

Mobile Device Security Policy

Tech Republic Security

Mobile devices are commonly used to conduct company business, which can render them more susceptible to risk than desktop or even laptop computers. In addition, the same social engineering, phishing and application/operating system vulnerabilities which plague desktops.

Mobile 133
article thumbnail

It's time to retire the Social Security number

Tech Republic Security

With 40 million people having their SSN exposed during the T-Mobile hack, it's time to reconsider the usefulness of the Social Security number.

Social 194
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Mobile Malware Uses Deepfakes, Social Engineering to Bypass Biometric Authentication

SecureWorld News

A sophisticated form of mobile malware dubbed "GoldPickaxe" has been uncovered, which collects facial recognition data to produce deepfake videos, enabling hackers to bypass biometric authentication protections on banking apps. The hackers rely heavily on social engineering tactics to distribute the malware.

Malware 78
article thumbnail

Technology’s role in social sustainability

CIO Business Intelligence

Technology has a critical role to play in any organization’s social sustainability strategy. And according to a survey from NTT, a majority of senior executives recognize this and are actively working to harness digital technology and innovation to support their social sustainability initiatives. That number is set to grow.

Social 111
article thumbnail

T-Mobile breach exposed personal data of almost 50 million people

Tech Republic Security

Attackers captured the names, dates of birth, Social Security numbers and driver's license numbers of millions of current, former and potential T-Mobile customers.

Mobile 152
article thumbnail

Sophisticated Attacks Against Mobile Devices Surge 187%

SecureWorld News

In today's interconnected world, mobile devices have become an integral part of our lives, enabling seamless communication, productivity, and access to sensitive information. However, as reliance on mobile technology grows, so does the risk of cyber threats targeting these devices.

Mobile 85
article thumbnail

T-Mobile investigating hack that affected 37 million customer accounts

GeekWire

(GeekWire File Photo / Taylor Soper) T-Mobile disclosed in a regulatory filing Thursday that a hacker obtained data from about 37 million customer accounts using an API, or application programming interface. 25, and T-Mobile identified the bad actor Jan. The Bellevue, Wash.-based The hack started on or around Nov.

Mobile 132