Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Until recently, cybercriminals could have hijacked the account of any GroupMe user simply by knowing the phone number connected to the targeted account, a researcher reported.
FireEye and Verizon Enterprise have teamed up to bring together Verizon managed services and FireEye threat protection offerings.
Android 5.0, the latest version of Google's Android operating system comes with some interesting new functionality features and is designed to be much more secure than its predecessors.
North Korea attempted to hack tens of thousands of South Korean smartphones this year, using malware disguised in mobile gaming apps, the South's spy agency said in a report.
Apple CEO Tim Cook met a senior Chinese official Wednesday, days after hackers targeted the company's iCloud service in an attack which an anti-censorship group claims originated in China.
Researchers have found a way to trick Android users into executing potentially malicious applications by hiding them inside innocent-looking image files.
FBI chief James Comey renewed a call for broader authority to tap into emerging technologies, saying the Edward Snowden revelations have led to unwarranted mistrust of law enforcement.
Sophos has acquired Mojave Networks, a cloud-based security solutions provider based in San Mateo, California.
A Same Origin Policy (SOP) bypass vulnerability has been identified in the Android browser installed by default on versions of the operating system prior to 4.4.
Security researchers have uncovered two pieces of mobile malware appearing to be used by the Chinese government to keep a close eye on pro-democracy protesters.

FEATURES, INSIGHTS // Mobile Security

rss icon

Ryan Naraine's picture
Security researchers Charlie Miller and Chris Valasek join the podcast to talk about their work hacking the into modern vehicles to manipulate steering, acceleration, speedometers and safety sensors.
Gant Redmon's picture
Being in a public place makes you fair game. So what makes a place private instead of public? This is where that famed “reasonable person” comes in.
Avi Chesla's picture
While Long Term Evolution (LTE) networks bring the promise of relieving traffic jams for mobile operators, they also entail new security risks.
Nick Cavalancia's picture
Company Owned, Personally Enabled devices (COPE) provide a high-degree of centralized control and monitoring while allowing employees to install consumerized, personal-use applications.
Nick Cavalancia's picture
There is no way to deal with the risk that BYOD brings. Between Android and iOS, there are millions of apps readily available for download, countless numbers of which open up doors in BYOD technologies that hackers and cybercriminals can easily stroll through.
Nimmy Reichenberg's picture
From a security perspective, most consumer devices and services leave much to be desired. The tools at the disposal of security professionals for dealing with consumerization are quite limited and include the ability to Block it, Wrap it, or Allow it and pray.
Dr. Mike Lloyd's picture
The BYOD problem isn’t even about BYOD; it’s about the ability to visualize, understand, and control your whole infrastructure, including this latest addition to the network map.
Nimmy Reichenberg's picture
While BYOD is concerned with the risk from personal devices, BYON (Bring Your Own Network) is a different type of risk
Jon-Louis Heimerl's picture
If regulatory protected information gets onto your device, you are obligated to protect it. Are you fully prepared to guarantee that everything you are doing on your personally managed device meets the obligations of you and your organization to protect sensitive information?
Chris Poulin's picture
Before you join the stampede with all the organizations who have bought into the concept of unifying personal and business devices, consider that one size can risk all.