Communication

  • Blog

    Apple satellite patent takes big step toward stable communication – Computerworld

    Freecloud All this investment isn’t just focused on voice and messaging. Operators also recognize that as demand for mobile connectivity increases, it becomes essential to find ways to offload some of this activity to alternative networks. That’s why carriers support Wi-Fi calls — because shunting relatively unprofitable voice calls off their network enables them to offer their capacity to support more…

    Read More »
  • Blog

    QR codes bypass browser isolation for malicious C2 communication

    Mandiant has identified a novel method to bypass browser isolation technology and achieve command-and-control operations through QR codes. Browser isolation is an increasingly popular security technology that routes all local web browser requests through remote web browsers hosted in a cloud environment or virtual machines. Any scripts or content on the visited web page is executed on the remote browser rather…

    Read More »
  • Blog

    Criminals Use Malware to Steal Near Field Communication Data

    Recent research by cybersecurity company ESET provides details about a new attack campaign targeting Android smartphone users. The cyberattack, based on both a complex social engineering scheme and the use of a new Android malware, is capable of stealing users’ near field communication data to withdraw cash from NFC-enabled ATMs. Constant technical improvements from the threat actor As noted by…

    Read More »
Back to top button
close