Multiple Bugs Enable Eavesdropping on 37% of Android Phones

Multiple Bugs Enable Eavesdropping on 37% of Android Phones Security researchers have revealed new vulnerabilities in a popular Android chip which could have allowed threat actors to snoop on the…

What is Endpoint Security?

A significant portion of cyberattacks target endpoints, either individually or as gateways to the larger company network. Unfortunately, this is not a singular threat, but a layered issue: hackers exploit…

All You Need to Know About Black Friday Scams: How to Recognize Them and Stay Safe

Black Friday is approaching and in the run-up to the huge sales day, you should stay safe when it comes to the scams and tricks that malicious actors might try…

Rooting Malware Is Back for Mobile. Here’s What to Look Out For.

Hank Schless, senior manager of security solutions at Lookout, discusses AbstractEmu, mobile malware found on Google Play, Amazon Appstore and the Samsung Galaxy Store. Over the last several years, as…

UK Government Orders Phase Two Review into Nvidia-Arm Deal

UK Government Orders Phase Two Review into Nvidia-Arm Deal The UK government has ordered a phase two investigation into Nvidia’s proposed acquisition of chip designer Arm, citing competition and national…

Heimdal™ Security Feature on Irish Tech News Podcast to Discuss the Recent GLS Scam Insights

Copenhagen, November 16th, 2021 – Heimdal™ Security (Heimdal™) CEO Morten Kjærsgaard appeared on The Irish Tech News Podcast with Ronan Leonard to discuss the recent GLS Scam Campaign discovered by our SOC Team and…

This new attack bypasses Rowhammer defenses in most DRAM, say researchers

Researchers have revealed a new type of Rowhammer attack on DRAM devices that can reliably bypass mitigations implemented by vendors after the first such attacks emerged in 2014.  ZDNet Recommends…

iPhone users don't care about sideloading

Well, there we have it. The Apple CEO has said it. If you want to sideload apps on a smartphone, buy an Android. Speaking at The New York Times “DealBook”…

Unified Endpoint Management Explained: (Why) Does Your Company Need One?

This post is also available in: Danish Gone are the days when a lone system administrator would perch upon the ledge of your desk to help you with menial tasks…

DOD Licenses Data Carver

DOD Licenses Data Carver A digital forensics tool capable of retrieving previously unrecoverable data is now available to license from the United States Department of Defense’s Cyber Crime Center (DC3). DC3's Advanced…