Remove Applications Remove Banking Remove Security
article thumbnail

New Xenomorph Android malware targets more than 50 banking and financial applications

Tech Republic Security

Some banking malware targets mobile devices and can quickly steal money from banking accounts. Meet Xenomorph, a new malware targeting Android and more than 50 banking and financial applications.

Malware 540
article thumbnail

Nexus Android malware targets 450 financial applications

Tech Republic Security

Learn how to protect your organization and users from this Android banking trojan. The post Nexus Android malware targets 450 financial applications appeared first on TechRepublic.

Malware 539
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Android banking malware disguises as crypto app to spread

Tech Republic Security

A new banking Trojan dubbed "Malibot" pretends to be a cryptomining application to spread between Android phones. The post New Android banking malware disguises as crypto app to spread appeared first on TechRepublic. While only active now in Spain and Italy, it could begin targeting Americans.

Malware 449
article thumbnail

Enter the next phase of Industry 4.0 with edge AI

CIO Business Intelligence

Two things play an essential role in a firm’s ability to adapt successfully: its data and its applications. What companies need to do in order to cope with future challenges is adapt quickly: slim down and become more agile, be more innovative, become more cost-effective, yet be secure in IT terms.

Industry 305
article thumbnail

7 types of tech debt that could cripple your business

CIO Business Intelligence

After all, a low-risk annoyance in a key application can become a sizable boulder when the app requires modernization to support a digital transformation initiative. Accenture reports that the top three sources of technical debt are enterprise applications, AI, and enterprise architecture.

article thumbnail

Six steps to creating a successful IT strategy: A guide for CIOs

CIO Business Intelligence

This process includes establishing core principles such as agility, scalability, security, and customer centricity. For example, a company aiming for market expansion might focus on developing scalable infrastructure, enabling application localization, and enhancing security measures to support operations in new regions.

Strategy 334
article thumbnail

As mainframe application development grows, so does the security risk

CIO Business Intelligence

A Rocket Software survey found that over half (51%) of IT leaders rely on mainframe systems to handle all, or nearly all, core business applications. Despite the importance of the mainframe, it has been neglected over the years with organizations focusing on perimeter security.