logo
#

Latest news with #FieldEffect

Dangerous new Android malware is adding fake contacts to your phone while draining bank accounts
Dangerous new Android malware is adding fake contacts to your phone while draining bank accounts

Tom's Guide

time4 days ago

  • Business
  • Tom's Guide

Dangerous new Android malware is adding fake contacts to your phone while draining bank accounts

A new Android malware strain is making the rounds online that makes it incredibly difficult to distinguish who's actually calling you as it was recently updated with the ability to add fake contacts to your phone. As reported by BleepingComputer, the malware in question is called Crocodilus, and it was first discovered back in March of this year by Threat Fabric. While it was initially used to target crypto users in Turkey to drain their wallets, the malware is now being distributed on a global scale and is currently being used to target the best Android phones in the U.S., Spain, Argentina, Brazil, Indonesia and India. In a blog post, the cybersecurity firm Field Effect explains that Crocodilus is distributed using a custom dropper so that it can bypass Android's built-in security measures. For instance, it doesn't need access to Android's Accessibility Services or other user permissions to end up on a vulnerable smartphone. Likewise, it's also able to bypass the built-in defenses of Google Play Protect. Crocodilus' latest new ability is particularly worrying since hackers can easily use it in social engineering attacks. For instance, you might see a call come through from your bank after visiting a malicious website on your phone. However, since Crocodilus can now be used to add fake contacts to your phone, it could actually be hackers trying to scam you out of your hard-earned cash on the other end of the line. Here's everything you need to know about this new threat, including some tips and tricks to help you stay safe from hackers trying to infect your smartphone with malware. Though still quite new, Crocodilus is already a full-featured Android malware with loads of malicious capabilities. For example, it can remotely take over your smartphone, steal data from it and use overlay attacks to mimic popular financial and banking apps to steal your credentials. Now, in the latest version of this malware, the ability to add fake contacts to a victim's phone has been added to Crocodilus. Once this is done, the device will display the name listed in a caller's contact profile as opposed to their caller ID when an incoming call is received. Get instant access to breaking news, the hottest reviews, great deals and helpful tips. With this new capability, hackers using the Crocodilus malware in their attacks can easily impersonate banks, trusted companies and even your friends and family members. Given that more people text than call these days, potential victims could easily fall for a text from a friend or family member asking them to send money in an emergency and have no idea that they did so. It's also worth noting that these fake contacts aren't tied to your Google account. Instead, they remain on an infected phone and won't sync with your other devices once you log in to them. At this time, it's currently unknown how Android users are being tricked into infecting their phones with the Crocodilus malware. However, Field Effect's researches suggest that the malware is likely being distributed via malicious sites, fake promotions sent through social media or via text and on third-party app stores. You can never be too careful on your phone and this is especially true with new malware strains like Crocodilus. From clicking a bad link to downloading a malicious app, there are plenty of ways in which your devices can become infected with a virus. For this reason, I always recommend limiting the number of apps on your phone. This is because even good apps can go bad when injected with malicious code and it's always easier to ensure that the apps you do have installed are up to date when there are few of them overall. At the same time, you want to stick to downloading new apps from the Google Play Store or other first-party Android app stores like the Samsung Galaxy Store or the Amazon App Store. The reason being is that the apps on unofficial, third-party app stores don't go through the same rigorous security checks that they would on other platforms. To stay safe from Android malware, first and foremost, you want to make sure that Google Play Protect is enabled on your smartphone. This free security tool scans all of the new apps you download as well as any existing apps on your phone for malware and other threats. However, as hackers will often find ways to bypass Android's built-in security tools like we've seen here, you may also want to consider downloading and installing one of the best Android antivirus apps for extra protection. If you want to be extra safe, though, the best identity theft protection services can help you regain your identity and any funds lost to fraud after a major malware attack. Given that the Crocodilus malware has already been updated quite frequently despite it being fairly new, I expect this won't be the last we hear of this Android malware strain, especially now that hackers are using it in attacks in even more countries.

NIT Rourkela designs a novel semiconductor device-based biosensor
NIT Rourkela designs a novel semiconductor device-based biosensor

Hans India

time24-05-2025

  • Health
  • Hans India

NIT Rourkela designs a novel semiconductor device-based biosensor

Researchers at the National Institute of Technology (NIT) Rourkela have designd a novel semiconductor device-based biosensor that can identify breast cancer cells without the need for complicated or expensive laboratory procedures. The device 'TFET' (Tunnel Field Effect Transistor) is based on TCAD (Technology Computer-Aided Design) simulation results, that can effectively detect breast cancer cells. FETs are commonly used in electronics, but here they have been adapted to function as a sensitive detector of biological materials. Unlike many traditional tests, this biosensor does not need any added chemicals or labels to work. It uses the physical properties of cancer cells to detect them. Cancerous breast tissues, which hold more water and are denser than healthy tissues, interact differently with microwave radiation. These differences, known as dielectric properties, make it possible to distinguish between healthy and cancerous cells. The findings of the research published in the Microsystem Technologies journal, showed that the sensor is sensitive in detecting T47D cancer cells due to their high density and permittivity. It is also highly effective at distinguishing cancerous cells from healthy breast cells, offering improved sensitivity compared to existing technologies. 'A small cavity is etched into the transistor under the gate area, and an equivalent material of biological sample of cells is placed in the cavity to check the sensitivities of the device. The sensor then reads changes in electrical signals based on the properties of the sample, essentially 'sensing' whether the cells are cancerous or healthy,' said Prof. Prasanna Kumar Sahu, Department of Electrical Engineering, NIT Rourkela. 'Because cancer cells like T47D have a higher dielectric constant than healthy ones like MCF-10A, the sensor picks up these differences quickly and with high precision,' Sahu added. Another key feature of the developed technology is its affordability. TFET-based biosensors are affordable compared to conventional testing methods and other existing FET-based biosensors. The developed technology holds significant promise for future medical applications, resulting in low-cost, easy-to-use diagnostic devices that bring early breast cancer detection to clinics, mobile testing units, and home settings. As the next step, the research team is exploring potential collaborations for fabrication and scientific validation of the developed technology.

Field Effect Grows MSP Bookings by 85% in 2024
Field Effect Grows MSP Bookings by 85% in 2024

Associated Press

time20-02-2025

  • Business
  • Associated Press

Field Effect Grows MSP Bookings by 85% in 2024

Strategic Innovations in MDR Pay Off Big for Canadian Cybersecurity Company OTTAWA, ON, Feb. 20, 2025 /PRNewswire/ - Field Effect, a global leader in cybersecurity solutions, is proud to announce an impressive 85% increase in Managed Service Provider (MSP) bookings in 2024. This boost in business is largely attributed to recent strategic innovations in its Managed Detection and Response (MDR) offering. Firstly, in fall 2024, Field Effect introduced MDR Core, in complement to its flagship MDR Complete solution. MDR Core provides essential cloud monitoring and endpoint detection and response capabilities for businesses with less IT complexity. In contrast, MDR Complete offers comprehensive risk management and protection across endpoints, networks, and cloud services, ideal for larger businesses or ones with more complex needs. 'These recent innovations reflect Field Effect's dedication to providing MSPs with versatile and effective cybersecurity solutions that are priced-right, easy to manage, all from one intuitive dashboard,' said Matt Holland, CEO and Founder of Field Effect. 'By expanding our MDR offerings and enhancing risk management capabilities, we've empowered our partners to deliver exceptional security services tailored to each client's unique needs. We love our partners and it's clear our partners love Field Effect MDR.' Field Effect doubled down on its commitment to proactively reducing risk for MSPs and their clients by launching the Field Effect Risk Score and Dark Web Monitoring features. The Risk Score provides continuous assessment of an organization's security posture, identifying vulnerabilities and offering actionable insights to mitigate potential threats. The Dark Web Monitoring service scans over 1,000 dark web sources with daily or monthly options, detecting exposed credentials, financial information, and personally identifiable data. These tools enable MSPs to address risks promptly, reducing the likelihood of successful cyberattacks. Finally, in 2024 Field Effect illustrated the power of its proprietary endpoint agent and its ability to stop attacks at the earliest stages. The company participated in the MITRE Engenuity ATT&CK® Evaluations for Managed Services (round 2), and their results demonstrated a mean time to detect threats of just 11 minutes—a score that was second only to CrowdStrike and was four to six times faster than the likes of SentinelOne, Trend Micro, and Sophos. This rapid detection capability ensures that potential security incidents are identified and addressed swiftly, minimizing impact on client operations. 'One of our biggest differentiators at Field Effect is that we listen to our partners. Many of the pivots we made this year were in direct response to partner feedback on how we can better meet their needs, make their lives easier and their businesses more successful. The launch of MDR Core and risk management enhancements are a direct reflection of this feedback loop,' said Holland. The significant growth in the MSP market underscores the broad recognition of Field Effect's innovative approach to cybersecurity. As cyber threats continue to evolve, Field Effect remains steadfast in its mission to equip MSPs with the tools and support necessary to protect businesses of all sizes around the world. About Field Effect Every business deserves powerful protection from cyber threats. Field Effect's cybersecurity solutions were purpose-built to prevent, detect and respond to threats for clients of all sizes. We take on the complexity behind the scenes and deliver a solution that's sophisticated where it matters, and simple everywhere else. Consolidate your tech and eliminate the noise while empowering users of all technical backgrounds to confidently navigate cybersecurity and avoid disruptions. Complexity out, clarity in.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store