Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Upwards of million Android devices were infected with an SMS worm on August 2, the day the country celebrated Valentine's Day.
According to a recent the study, 99% of the most popular free Android and iOS apps exhibit at least one type of behavior that poses a security or privacy threat to organizations.
Open Whisper Systems announced the availability of Signal, an iPhone application that lets users make encrypted voice calls worldwide for free.
BlackBerry announced the acquisition of German voice and data encryption and anti-eavesdropping firm Secusmart
In this podcast, Chief Technology Officer at Bluebox Security Jeff Forristal, discusses a significant Android vulnerability that lets hackers create a malicious application by copying the ID of a legitimate application to gain the same special privileges of the legitimate app.
A serious vulnerability exists in the Android operating system, which could allow malicious apps to impersonate well-known trusted apps such as Google Wallet. Essentially anything that relies on verified signature chains of an Android application is undermined.
Several undocumented forensic services running on all iOS devices can be leveraged as attack points and surveillance mechanisms, a security researcher revealed at the Hope X conference.
SMS-based two-factor authentication (2FA) mechanisms used by banks to secure their customers' accounts have been bypassed by cybercriminals using a combination of malware, mobile apps, rogue DNS servers, and phishing sites, according to a report from Trend Micro.
Apple is fighting Chinese claims that the iPhone threatens national security through its ability to track and time-stamp a user's location.
Silent Circle now allows customers to make encrypted voice calls in a total of 79 countries, the company announced on Thursday.

FEATURES, INSIGHTS // Mobile Security

rss icon

Adam Ely's picture
This shift to mobile exposes a major fault that needs to be addressed and security practices must address mobile threats as well.
Adam Ely's picture
Yesterday’s device management approach does not work in a BYOD world. The end users are bringing their own devices, so we need to adjust to accommodate this new world order.
Adam Ely's picture
Security teams and lines of business have reached a turning point on BYOD. It’s now become more important than ever for the CISO to figure out how to manage risk without inhibiting users.
Adam Ely's picture
Many of us create our own blind spots through assumption. Until we understand what is occurring on mobile devices, we cannot determine if our controls are effective at managing risk.
Adam Ely's picture
CISOs are notoriously disliked. Trying to protect company, customer and employee data often means having to say “no” to new projects and implementations. This does not earn you many friends.
Ryan Naraine's picture
John Hultquist, Manager of Cyber Espionage Threat Intelligence at ISIGHT Partners, joins the podcast to talk about "NEWSCASTER," a cyber espionage operation that uses fictitious social media accounts to launch attacks.
Danelle Au's picture
Enterprises must find the right balance to deliver a mobile security environment that meets productivity and flexibility needs without putting devices, apps, or data at risk.
Ryan Naraine's picture
In this podcast, Richard Boscovich, assistant general counsel in the Microsoft Digital Crimes Unit, talks about the new Microsoft Cybercrime Center and the ongoing battle to stop the proliferation of botnets around the world.
Wade Williamson's picture
If you are going to analyze network traffic for hidden malware or look for anomalous behaviors that indicate an infection, you should be sure to include mobile devices and mobile malware in your efforts.
Ryan Naraine's picture
Vinnie Liu from Bishop Fox joins Ryan Naraine on the podcast to warn businesses about the security risks associated with the new LinkedIn Intro application.