Apple stuck to its argument that the FBI was overstepping legal bounds by using an All Writs Act to compel the company to help break an iPhone used by one of the shooters in the December terror attack in San Bernardino, California. [Read More]
South Korea's spy agency said Tuesday that North Korea had hacked into smartphones belonging to a number of key government officials, part of a series of cyber-attacks launched after its fourth nuclear test. [Read More]
If you are going to analyze network traffic for hidden malware or look for anomalous behaviors that indicate an infection, you should be sure to include mobile devices and mobile malware in your efforts.
Many security experts believe the next wave of enterprise hacking will be carried out via the mobile channel. What steps can be taken to maintain the productivity gains and cost-savings associated with BYOD, while proactively managing and mitigating security risks associated with this practice?
Costin Raiu of Kaspersky Lab's global research and analysis team talks about the global implications of the Icefog APT campaign and discloses that a major command-and-control shutdown is currently underway.