Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Pizza Hut hacked. Users who placed an order on the website or via the mobile app may have had their credit card data stolen [Read More]
The recently discovered Red Alert 2 Android Trojan is using an infrastructure that serves fake Adobe Flash Android apps to unsuspecting users, RiskIQ has discovered. [Read More]
High-Tech Bridge launches Mobile X-Ray, a free online service designed for testing native and hybrid iOS and Android apps [Read More]
Appthority report reveals which iOS and Android apps are the most blacklisted by security teams [Read More]
Google this week released its October 2017 Android patches, which address a total of 14 vulnerabilities in the mobile platform, including five rated Critical severity. [Read More]
Federal judge allows the FBI to keep secret the details of a hacking tool used to access the iPhone of the San Bernardino terrorist [Read More]
Privacy-focused communications app Signal is working on improving protection for contact information using Intel SGX technology [Read More]
A popular Android keyboard application with over 200 million downloads was found to gather user information and send it to a remote server, Adguard reveals. [Read More]
Analysis of 21 popular mobile stock trading apps revealed the existence of several vulnerabilities and the lack of important security features [Read More]
Google discloses critical remote code execution vulnerabilities affecting the Wi-Fi chips found in iOS and Android devices [Read More]

FEATURES, INSIGHTS // Mobile Security

rss icon

Danelle Au's picture
Enterprises must find the right balance to deliver a mobile security environment that meets productivity and flexibility needs without putting devices, apps, or data at risk.
Ryan Naraine's picture
In this podcast, Richard Boscovich, assistant general counsel in the Microsoft Digital Crimes Unit, talks about the new Microsoft Cybercrime Center and the ongoing battle to stop the proliferation of botnets around the world.
Wade Williamson's picture
If you are going to analyze network traffic for hidden malware or look for anomalous behaviors that indicate an infection, you should be sure to include mobile devices and mobile malware in your efforts.
Ryan Naraine's picture
Vinnie Liu from Bishop Fox joins Ryan Naraine on the podcast to warn businesses about the security risks associated with the new LinkedIn Intro application.
Torsten George's picture
Many security experts believe the next wave of enterprise hacking will be carried out via the mobile channel. What steps can be taken to maintain the productivity gains and cost-savings associated with BYOD, while proactively managing and mitigating security risks associated with this practice?
Ryan Naraine's picture
Costin Raiu of Kaspersky Lab's global research and analysis team talks about the global implications of the Icefog APT campaign and discloses that a major command-and-control shutdown is currently underway.
Michael Callahan's picture
The problem with this Internet of Things is that the manufacturers of "smart" devices are not always as concerned about security as we end-users might want them to be.
Ryan Naraine's picture
Jerry Bryant, Senior Security Strategist in the Microsoft Trustworthy Computing group chats about the company's thinking behind the expansion of the Microsoft Active Protections Program (MAPP).
Wade Williamson's picture
As security professionals, it’s our job to see around the corner whenever possible. While the sky is not falling, if controlling mobile malware isn’t on your radar, it definitely should be.
Ryan Naraine's picture
Security researchers Charlie Miller and Chris Valasek join the podcast to talk about their work hacking the into modern vehicles to manipulate steering, acceleration, speedometers and safety sensors.