Gooligan Android malware can steal authentication tokens stored on devices which can be used to access sensitive data from Gmail, Google Photos, Google Docs and other services, including G Suite [Read More]
If you are going to analyze network traffic for hidden malware or look for anomalous behaviors that indicate an infection, you should be sure to include mobile devices and mobile malware in your efforts.
Many security experts believe the next wave of enterprise hacking will be carried out via the mobile channel. What steps can be taken to maintain the productivity gains and cost-savings associated with BYOD, while proactively managing and mitigating security risks associated with this practice?
Costin Raiu of Kaspersky Lab's global research and analysis team talks about the global implications of the Icefog APT campaign and discloses that a major command-and-control shutdown is currently underway.