Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Google has recently made changes to the way permissions for Android applications are displayed, but experts warn that the modifications make automatic updating of mobile applications riskier than before.
Malware authors have developed a new version of the Svpeng Android Trojan, which they’re currently using to target users in the United States.
Mojave Networks has added a new feature to the company’s professional and enterprise services in an effort to help organizations minimize the risks posed by the mobile applications used by their employees.
While most organizations have patched the Heartbleed bug in their OpenSSL installations, a security expert has uncovered new vectors for exploiting the vulnerability, which can impact enterprise wireless networks, Android devices, and other connected devices.
Katie Moussouris talks about her new job as Chief Policy Officer at HackerOne and the ongoing debates around vulnerability research and bug bounty programs.
Endpoint breaches involving mobile devices will increase in the years to come, and many of them will be due to mobile application misconfiguration, Gartner said.
Symantec has acquired mobile security and management solutions provider NitroDesk in an effort to expand its enterprise mobile offerings.
Mobile security startup Lookout is turning smartphones and tablets against gadget thieves with a new feature that -- when possible -- will snap a picture of the culprit.
A new banking Trojan disguised as the popular messaging app WeChat is being used by cybercriminals to harvest the financial data of Android users in China.
Cybercriminals are using stolen Apple credentials to lock iPhones, iPads and Macs and hold them for ransom.

FEATURES, INSIGHTS // Mobile Security

rss icon

Nimmy Reichenberg's picture
From a security perspective, most consumer devices and services leave much to be desired. The tools at the disposal of security professionals for dealing with consumerization are quite limited and include the ability to Block it, Wrap it, or Allow it and pray.
Dr. Mike Lloyd's picture
The BYOD problem isn’t even about BYOD; it’s about the ability to visualize, understand, and control your whole infrastructure, including this latest addition to the network map.
Nimmy Reichenberg's picture
While BYOD is concerned with the risk from personal devices, BYON (Bring Your Own Network) is a different type of risk
Jon-Louis Heimerl's picture
If regulatory protected information gets onto your device, you are obligated to protect it. Are you fully prepared to guarantee that everything you are doing on your personally managed device meets the obligations of you and your organization to protect sensitive information?
Chris Poulin's picture
Before you join the stampede with all the organizations who have bought into the concept of unifying personal and business devices, consider that one size can risk all.
Marc Solomon's picture
Organizations need to understand the security gaps the Mobile Enterprise presents and embrace a combination of security tools and techniques to bridge these gaps.
Johnnie Konstantas's picture
How can you defend against a new generation of threats and attackers that are leveraging automation and outpacing alerting mechanisms and manual-access controls?
Jon-Louis Heimerl's picture
Hacking a phone is one thing, but hacking voicemail is something else, and while your voicemail does have some protection, breaking into it is not very complicated.
Johnnie Konstantas's picture
IT managers aren’t the only ones aware of this BYOD trend – attackers are too. Whether their aim is to promote a cause (hacktivism) or turn a profit, our mobile devices constitute perhaps the easiest way to do so.
Chris Hinkley's picture
Mobile applications and the platforms they are built on make PA-DSS compliance difficult due to the rapidly evolving threat landscape. With increased attacks and their tragic affects on businesses and consumers, it's important to make make sure your mobile operations properly secured.