Mobile Application Security

Up your mobile application security

Mobile Application security focuses on assessing the security posture of applications on various mobile device platforms (i.e. Android, iOS and Windows). Mobile applications are being utilised by businesses across the globe to organise workforces, improve customer service, increase revenue, and connect with users from around the world. Like computers and websites, mobile applications have their[…]

REvil

REvil Hackers

The hacking group REvil behind the “colossal” ransomware attack have now demanded over £50m to be paid in Bitcoin in return for their systems to be unlocked for all victims affected.   Although unverified, the group claims that after targeting the US IT firm Kaseya a few days ago, they have also attacked one million other systems as[…]

Crackonosh

Crackonosh

As gaming becomes an increasingly popular entertainment medium that influences many people and popular culture it is no surprise that hackers are finding ways to profit from this. Cyber criminals have said to have profited around £1.4m so far from Crackonosh Hackers are now able to insert code into existing games that they advertise to[…]

PDF

PDF Vulnerabilities

PDF’s are used daily by most businesses for multiple reasons. Throughout the pandemic however they have become increasingly popular to send and sign agreements digitally. A new report however has found a security vulnerability in most certified PDF application that can leave businesses exposed to attack. Researchers explained certified PDFs use two specific signatures to[…]

recaptcha

reCAPTCHA phishing attack

A large scale phishing attack campaign has been utilising a fake Google reCAPTCHA system to attempt to steal Microsoft 365 credentials. Google reCAPTCHA is one of their services designed to help protect websites from bots that spam and try to gain information. The system uses a Turing test to tell if the person is human[…]