Telegram’s Privacy Paradox
Ram Narayanan, Country Manager at Check Point Software Technologies, Middle East, discusses how Telegram exemplifies the tension between privacy and security, highlighting the challenges platforms faceRead More…
Ram Narayanan, Country Manager at Check Point Software Technologies, Middle East, discusses how Telegram exemplifies the tension between privacy and security, highlighting the challenges platforms faceRead More…
Amid rising concerns about Telegram’s security, the Kaspersky Digital Footprint Intelligence team analyzed shadow Telegram channels. Their findings reveal a troubling trend: cybercriminals are increasingly using Telegram as a platform for the underground market activities. Cybercriminals actively operate channels and groups on Telegram dedicated to discussing fraud schemes, distributing leaked databases, andRead More…
Due to the recent surge in phishing scams targeting WhatsApp users, Binance, the world’s leading blockchain ecosystem and provider of cryptocurrency infrastructure, clarifies that its only official communication channels are through platforms such as Twitter, Facebook, Instagram, Telegram, and email. Binance has seen an increase in the social engineering attemptsRead More…
ESET researchers have discovered dozens of copycat Telegram and WhatsApp websites targeting mainly Android and Windows users with trojanized versions of these instant messaging apps. Most of the malicious apps we identified are clippersRead More…
ESET researchers identified an active StrongPity APT group campaign leveraging a fully functional but trojanized version of the legitimate Telegram app, which despite being non-existent, has been repackaged as „the“ Shagle app.Read More…
Tamer Odeh, Regional Director at SentinelOne, Middle East, discusses the reality of data privacy and how to maximize privacy online.Read More…
Cybersecurity researchers have reported a critical flaw in the Android versions of WhatsApp and Telegram that allows attackers to manipulate media files sent via the apps. This vulnerability could allow attackers to alter photographs, modify invoices (in financial scams), swap files in a particular channel feed, or potentially even manipulate audioRead More…
Copyright © 2023 - Zarks Media. All rights reserved