Mobile security startup Mojave Networks announced that it has closed a $5 million round of funding, in addition to launching a cloud-based, enterprise-grade solution that protects mobile devices starting at the network level.
A survey of 2,100 applications from Forbes Global 2000 companies found that many are accessing personal information such as address books while failing to utilize encryption and other security measures.
On Wednesday at the Mobile Pwn2Own hacking contest taking place at the PacSec Applied Security Conference in Tokyo, security researchers demonstrated two iPhone exploits that leverage Apple’s Safari mobile web browser.
At Mobile Pwn2Own, team MBSD, of Japanese firm Mitsui Bussan Secure Directions, Inc., earned $40,000 for their exploit efforts which enabled them to successfully compromise the Samsung device running Google’s Android.
In this podcast, Richard Boscovich, assistant general counsel in the Microsoft Digital Crimes Unit, talks about the new Microsoft Cybercrime Center and the ongoing battle to stop the proliferation of botnets around the world.
If you are going to analyze network traffic for hidden malware or look for anomalous behaviors that indicate an infection, you should be sure to include mobile devices and mobile malware in your efforts.
Many security experts believe the next wave of enterprise hacking will be carried out via the mobile channel. What steps can be taken to maintain the productivity gains and cost-savings associated with BYOD, while proactively managing and mitigating security risks associated with this practice?
Costin Raiu of Kaspersky Lab's global research and analysis team talks about the global implications of the Icefog APT campaign and discloses that a major command-and-control shutdown is currently underway.