Blog Posts Tagged with "mobile"

Fa42af438e58b799189dd26386f5870f

Crypto-Mining Malware Attacks on iPhones Up 400%: Report

October 16, 2018 Added by:Ionut Arghire

Crypto-mining malware attacks against iPhones went up 400% in the last two weeks of September, security firm Check Point notes in a new report.

Comments  (0)

9ae0fe776de46500a4f71f32673fad0f

Increasing Importance of Mobile Makes Malware a Priority

January 17, 2018 Added by:Asma Zubair

Businesses should fortify their high value apps with additional security precautions from the inside out.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Ztorg Trojan-SMS Infects Google Play Apps

June 24, 2017 Added by:Ionut Arghire

Newly discovered Google Play applications infected with the Ztorg Trojan family no longer request root privileges on compromised devices, Kaspersky Lab security researchers reveal.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Critical iOS "Quicksand" Vulnerability Lets Malicious Mobile Apps to Grab Enterprise Credentials

August 20, 2015 Added by:InfosecIsland News

Mobile security researchers have identified a critical security flaw in the iOS mobile operating system that affects all iPhone, iPod touch, iPad devices running iOS 7 and later.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Who Will Foot the Bill for BYOD?

September 10, 2014 Added by:Patrick Oliver Graf

The concept of "Bring Your Own Device" seems so simple. Employees can just tote their personal phone or tablet with them to the office – which they're probably doing anyway – and use it for work. Or, they access the corporate network remotely, from home or while on-the-go. BYOD and remote access have always seemed like a win-win arrangement – employers pay less hardware costs and employees g...

Comments  (0)

0b3620b53fede5eaa3256c2c0bbea3ba

Using iGoat to Explore Mobile Application Security Weaknesses

December 16, 2013 Added by:Michael Smith

The purpose of this post is to walk through all the steps needed to get iGoat setup “Soup to Nuts”. There is nothing here that is too difficult, but there are a few pitfalls in making this work.

Comments  (0)

631e72bff10f695d4be8dec9d08d7534

Preparing for the Internet of Things: Integrating Strong Authentication in Daily Life

November 04, 2013 Added by:Jochem Binst

The online world as we know it today is not the same as the one we got to know in the beginning of the Internet era and certainly not the one that is emerging today! People worldwide are starting to realize this. All they have to do now is act on it. Strong authentication to secure the online world will be embraced since it becomes a necessity; using strong authentication is the next step.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

BYOD, Policy Compliance Top Remote Access Concerns at Interop New York 2013

October 15, 2013 Added by:Patrick Oliver Graf

Many Interop vendors and experts agree that enterprises are relying on third-party service providers more than ever before. Businesses are acknowledging the growing prominence of trends including BYOD and the cloud, and are trying to be more flexible in terms of what applications, operating systems and devices they are supporting.

Comments  (0)

52a995fead03e1d828980d4b3efd2719

Today's Mobile Device Data Protection Must Go Beyond Encryption

August 21, 2013 Added by:Cam Roberson

Employers can be diligent in installing encryption protection software on the devices their employees use, but what happens if the password is compromised? Whenever the password is known, the laptop, smartphone or tablet is at no less security risk with encryption as it is without.

Comments  (50)

67d2e663c45c04a289aa302f0b6cccd1

Data Leakage Prevention Strategy for Portable Devices

June 24, 2013 Added by:Ajay Kumar

In a recent incident, a hard drive containing personal information of 14K students were found unattended for up to 48 hours in the computer lab of Champlain College in Burlington, which could have led to exposed of 14K social security numbers. So what is the issue here? It is the failure of technology, process or people?

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

UC Davis Uncovers Security Holes in Mobile Apps

April 16, 2013 Added by:InfosecIsland News

Popular texting, messaging and microblog apps developed for the Android smartphone have security flaws that could expose private information or allow forged fraudulent messages to be posted, according to researchers at the University of California, Davis.

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

How Secure Is Your Mobile Device?

March 13, 2013 Added by:Allan Pratt, MBA

Today, the world of mobile devices includes smartphones and tablets. This post doesn’t favor any specific brands, but let’s agree that the industry leaders are iOS and Android devices. The jury is still out as to whether or not BlackBerry will become a contender.

Comments  (1)

E85787adcaf7bca10e799cfd1cfd08f1

BYOD is Here to Stay. Take Device Lifecycle Into Account.

March 08, 2013 Added by:Michelle Drolet

t appears that BYOD, “Bring Your Own Device” to work, is beyond just being a growing trend if not currently a sanctioned practice within the corporate walls.

Comments  (1)

682e0e796084e163c5ca053dd8573b0c

iPhones Are Coming to the Plant Floor – Can we Secure Them?

February 20, 2013 Added by:Eric Byres

Like icebergs, mobile technology has become an unstoppable force of nature. They have invaded the corporate office – is the plant floor the next frontier? What is your company doing about mobile devices on the plant floor? Does it have a strategy?

Comments  (0)

37d5f81e2277051bc17116221040d51c

What Security Challenges to Focus on in the New Year

February 15, 2013 Added by:Robert Siciliano

In 2012, security challenges we faced were often the ribbon cuttings and business plans that startup criminal organizations launched. In 2013, those criminal enterprise business plans will come together—and we need to be ready.

Comments  (0)

37d5f81e2277051bc17116221040d51c

What’s on Your Phone? A Lot More than You Realize

January 31, 2013 Added by:Robert Siciliano

With all this invaluable data and information, and the growth in smartphones and tablets, it’s natural for criminal hackers to see these new devices as a huge opportunity, much like they did with the PC. So if you have a smartphone or tablet, make sure you take steps to protect yourself...

Comments  (0)