Categories
cybersecurity Scams

Combatting BEC: Advice From the World’s Most Famous Conman

It takes a thief to catch a thief, they say. So what can a thief teach us about BEC (Business Email Compromise), one of the most difficult to combat forms of computer theft?

Categories
cybersecurity

Come on Google Play, rip out these rip-off wallpapers!

Would you pay £179.99 for Android wallpaper? No, no you wouldn’t.

Categories
cybersecurity privacy

Why you should stay on guard against mobile phishers

You might spot a phishing email on your computer, but it’s much harder on your phone. Why is mobile phishing so successful, and how can you protect yourself?

Categories
cybersecurity privacy

What scammers can do with just a phone number

Our mobile numbers are often in the public domain, so here’s what you need to know to avoid scams and phishing.

Categories
cybersecurity stalkerware

Using Traced to stay protected from stalkerware

Traced is purpose-built to protect you from apps that spy on you, known as stalkerware.

Categories
cybersecurity

How websites can use your camera when your phone is locked

A bug in Firefox has exposed a little known fact about what apps can do behind your back.

Categories
cybersecurity

Android Incident Response Lab 3

Introduction During this lab we tie together techniques used in Lab 1 and Lab 2 to identify a malicious app sitting on our device along with the information it could have obtained access to. Following this, we move onto stage 3 of incident response, the containment phase to remove this malicious app from our device. […]

Categories
Uncategorized

Traced CTF

Introduction Rather than releasing our usual weekly incident response lab, this week we’re releasing a practical learning experience of an open source capture the flag competition.   You may be asking yourself how this ties in with Android incident response training, you’ll have to use some advanced techniques associated with the identification phase of Android incident […]

Categories
cybersecurity

Protected: traced CTF Submission

There is no excerpt because this is a protected post.

Categories
Uncategorized

Android Incident Response Lab 2

Introduction In this lab we remain focused on the identification phase of responding to an Android incident. This time we uncover a little bit more by extracting a suspicious APK from our device and identify some of its capabilities.  TL;DR Using ADB run the following commands to retrieve an APK from our test device: Then, […]