Tag Archive for: device

Largest navigation device maker combats bots with Cequence’s API Spartan


The world’s largest navigation device manufacturer has opted to secure its eCommerce experience and combat bot attacks with the bot detection and mitigation solution API Spartan, created by Cequence and part of the overarching Unified API Protection platform.

This decision was made in response to significant financial risks exposed by bot attacks. The company encountered approximately 100 million SSO login requests monthly, with 15 to 20 percent of these identified as malicious. They also revealed that account takeovers could result in costs ranging from $50 (40) to $12,000 (9,500) each. If left unchecked, these costs could culminate in billions potentially lost, spelling out disaster for the business.

Previously, the company had struggled with substandard bot protection from another internet security provider, who used rudimentary techniques reliant on identifying bad IP addresses. However, this method proved insufficient in detecting advanced malicious bots given its lack of behavioural analysis, leading to unresolved bot attacks and difficulties in ensuring business continuity and customer experience.

In searching for a more proactive solution to this predicament, the company turned to Cequence’s API Spartan. Cequence’s capabilities to discern genuine users from bots in real-time and adapt to evolving bot tactics appealed to the company, offering a reliable and future-proof answer to their bot issue.

“Bots aren’t just a technical nuisance; they’re customer experience assassins,” stated Ameya Talwalkar, CEO of Cequence. “Imagine loyal customers, eager to purchase your products, locked out by an army of automated bad actors. The frustration, lost sales, and reputational damage are a nightmare scenario no business can afford. That’s why Cequence is dedicated to providing solutions that go beyond simple bot detection. We empower companies to proactively safeguard their legitimate customers and foster a thriving online environment where trust and genuine interactions flourish.”

The OWASP API Security Top 10 highlights the vulnerability of poorly secured APIs to automated bot attacks, blurring the line between traditional API and bot attacks with unified security solutions…

Source…

Check these settings to protect your Android device from malware scams


SINGAPORE – Android phone users’ freedom to download apps outside of official app stores – a defining feature of the operating system – is being curtailed amid pressure on tech companies to crack down on malware scams that have proliferated on the mobile platform.

Google, which develops Android, announced on Feb 7 that it would, by default, block attempts to install apps from unverified sources that require sensitive permissions, starting from the week of Feb 21.

Sideloading, as it is called, is common practice for the installation of apps for tech enthusiasts or for overseas businesses that are not supported by Google’s ecosystem.

This open door to unverified apps has been exploited by fraudsters to plant viruses. Malware scams left a trail of losses worth more than $34 million in 2023, according to the police’s scam statistics, which found that many victims were duped into installing virus-laden apps on Android phones.

In response, Google and phone manufacturers have had to tighten security measures on their devices in Singapore.

The blocking of installations of apps from unverified sources is part of a Singapore trial by Google and the Cyber Security Agency of Singapore (CSA) that will involve all Android users.

It is among a slew of security features available on the Android operating system – some of which are tucked away in the many sub-menus of the phones’ settings.

Here is a guide on how you can ensure your Android phone is shielded from the malware menace.

Look out for the new software update 

The new Android security feature that blocks attempts to install sideloaded apps will be pushed automatically to all Android devices – there is no need to manually update a device, said Google’s director of Android security strategy Eugene Liderman, in reply to questions from The Straits Times.

The update will beef up Google Play Protect, an in-built program on Android devices that scans for harmful behaviour, issues warnings and blocks or automatically disables suspicious apps.

ST understands that users will not be notified when the new software is enabled on their devices, but they will find that any new attempts to install apps from suspicious…

Source…

Hackers uncover new TheTruthSpy stalkerware victims: Is your Android device compromised?


Image Credits: Bryce Durbin / TechCrunch

A consumer-grade spyware operation called TheTruthSpy poses an ongoing security and privacy risk to thousands of people whose Android devices are unknowingly compromised with its mobile surveillance apps, not least due to a simple security flaw that its operators never fixed.

Now, two hacking groups have independently found the flaw that allows the mass access of victims’ stolen mobile device data directly from TheTruthSpy’s servers.

Switzerland-based hacker maia arson crimew said in a blog post that the hacking groups SiegedSec and ByteMeCrew identified and exploited the flaw in December 2023. Crimew, who was given a cache of TheTruthSpy’s victim data from ByteMeCrew, also described finding several new security vulnerabilities in TheTruthSpy’s software stack.

SPYWARE LOOKUP TOOL

You can check to see if your Android phone or tablet was compromised here.

In a post on Telegram, SiegedSec and ByteMeCrew said they are not publicly releasing the breached data, given its highly sensitive nature.

Crimew provided TechCrunch with some of the breached TheTruthSpy data for verification and analysis, which included the unique device IMEI numbers and advertising IDs of tens of thousands of Android phones recently compromised by TheTruthSpy.

TechCrunch verified the new data is authentic by matching some of the IMEI numbers and advertising IDs against a list of previous devices known to be compromised by TheTruthSpy as discovered during an earlier TechCrunch investigation.

The latest batch of data includes the Android device identifiers of every phone and tablet compromised by TheTruthSpy up to and including December 2023. The data shows TheTruthSpy continues to actively spy on large clusters of victims across Europe, India, Indonesia, the United States, the United Kingdom and elsewhere.

TechCrunch has added the latest unique identifiers — about 50,000 new Android devices — to our free spyware lookup tool that lets you check if your Android device was compromised by TheTruthSpy.

Security bug in TheTruthSpy exposed victims’ device data

For a time, TheTruthSpy was one of the most prolific apps for facilitating…

Source…

How to Turn off Antivirus Protection: Software & Device 2024






How to Turn off Antivirus Protection: Software & Device 2024



























Cloudwards.net may earn a small commission from some purchases made through our site. However, any earnings do not affect how we review services. Learn more about our editorial integrity and research process.

Key Takeaways: How to Turn Off Antivirus

  • Most antivirus software can be disabled in just a few steps
  • Turning off antivirus protection can leave your device vulnerable to threats, so it is wise to turn it back on as soon as possible
  • There are a number of different ways to disable antivirus, and we cover many of them here

Sometimes it is necessary to disable antivirus protection in order to install software or troubleshoot issues. If you want to turn off your antivirus permanently or temporarily, you can do it through the antivirus app, your device or your browser. In this guide, we will walk you through several ways to turn off antivirus protection.

There are a lot of antivirus options to choose from. Check out our article on the best antivirus software for help on choosing the best option for you.

How to Turn Off Antivirus Protection: Quick Steps 

Turning off antivirus protection generally only requires a few steps. In our example, we will use Windows Security. We talk about other providers below. 

  1. Open Windows Security

    Search for Windows Security and open the app.

    Windows Security search bar
  2. Turn Off Windows Security

    Either switch “real-time…

Source…