Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

San Francisco-based Lookout, announced on Wednesday that it has raised a massive $150 million round of funding.
Upwards of million Android devices were infected with an SMS worm on August 2, the day the country celebrated Valentine's Day.
According to a recent the study, 99% of the most popular free Android and iOS apps exhibit at least one type of behavior that poses a security or privacy threat to organizations.
Open Whisper Systems announced the availability of Signal, an iPhone application that lets users make encrypted voice calls worldwide for free.
BlackBerry announced the acquisition of German voice and data encryption and anti-eavesdropping firm Secusmart
In this podcast, Chief Technology Officer at Bluebox Security Jeff Forristal, discusses a significant Android vulnerability that lets hackers create a malicious application by copying the ID of a legitimate application to gain the same special privileges of the legitimate app.
A serious vulnerability exists in the Android operating system, which could allow malicious apps to impersonate well-known trusted apps such as Google Wallet. Essentially anything that relies on verified signature chains of an Android application is undermined.
Several undocumented forensic services running on all iOS devices can be leveraged as attack points and surveillance mechanisms, a security researcher revealed at the Hope X conference.
SMS-based two-factor authentication (2FA) mechanisms used by banks to secure their customers' accounts have been bypassed by cybercriminals using a combination of malware, mobile apps, rogue DNS servers, and phishing sites, according to a report from Trend Micro.
Apple is fighting Chinese claims that the iPhone threatens national security through its ability to track and time-stamp a user's location.

FEATURES, INSIGHTS // Mobile Security

rss icon

Nick Cavalancia's picture
Company Owned, Personally Enabled devices (COPE) provide a high-degree of centralized control and monitoring while allowing employees to install consumerized, personal-use applications.
Nick Cavalancia's picture
There is no way to deal with the risk that BYOD brings. Between Android and iOS, there are millions of apps readily available for download, countless numbers of which open up doors in BYOD technologies that hackers and cybercriminals can easily stroll through.
Nimmy Reichenberg's picture
From a security perspective, most consumer devices and services leave much to be desired. The tools at the disposal of security professionals for dealing with consumerization are quite limited and include the ability to Block it, Wrap it, or Allow it and pray.
Dr. Mike Lloyd's picture
The BYOD problem isn’t even about BYOD; it’s about the ability to visualize, understand, and control your whole infrastructure, including this latest addition to the network map.
Nimmy Reichenberg's picture
While BYOD is concerned with the risk from personal devices, BYON (Bring Your Own Network) is a different type of risk
Jon-Louis Heimerl's picture
If regulatory protected information gets onto your device, you are obligated to protect it. Are you fully prepared to guarantee that everything you are doing on your personally managed device meets the obligations of you and your organization to protect sensitive information?
Chris Poulin's picture
Before you join the stampede with all the organizations who have bought into the concept of unifying personal and business devices, consider that one size can risk all.
Marc Solomon's picture
Organizations need to understand the security gaps the Mobile Enterprise presents and embrace a combination of security tools and techniques to bridge these gaps.
Johnnie Konstantas's picture
How can you defend against a new generation of threats and attackers that are leveraging automation and outpacing alerting mechanisms and manual-access controls?
Jon-Louis Heimerl's picture
Hacking a phone is one thing, but hacking voicemail is something else, and while your voicemail does have some protection, breaking into it is not very complicated.