By Louis Columbus
On average, there are 82 new rogue applications submitted per day to any given AppExchange or application platform, all designed to defraud consumers. Mobile and digital commerce are cybercriminals’ favorite attack surfaces because they are succeeding with a broad base of strategies for defrauding people and businesses. Phishing, malware, smishing, or the use of SMS texts rather than email to launch phishing attempts are succeeding in gaining access to victims’ account credentials, credit card numbers, and personal information to launch identity theft breaches. The RSA is seeing an arms race between cybercriminals and mobile OS providers with criminals improving their malware to stay at parity or leapfrog new versions and security patches of mobile operating systems.
By Bill Horne
As if Meltdown, Spectre and Foreshadow were not enough, recently a new critical vulnerability called ZombieLoad has been discovered that affects a series of modern Intel processors. This vulnerability enables a potential attacker to read small pieces of information from various programs running on the same computer, taking advantage of a special feature of the Intel chip called speculative execution.