Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Google researchers find 11 high-impact flaws in Samsung Galaxy S6 Edge. Samsung patched most of the issues. [Read More]
Hackers breached the systems of anti-adblocking service PageFair and used the access to deliver malware [Read More]
BlackBerry has completed the $425 million cash acquisition of secure mobility solutions provider Good Technology. [Read More]
Authorities in five European countries said Thursday they had staged a coordinated swoop on suspected users of spy malware that gives remote access to other people's smartphones. [Read More]
Google has stepped up the security of its Android operating system with the release of Android 6.0 Marshmallow by requiring manufacturers to enable full-disk encryption out-of-the-box for new devices. [Read More]
Apple is removing applications that collect personal data in violation of the company's privacy policies from its AppStore. [Read More]
Apple on Friday rid its App Store of some applications that it said could snoop on people's data and posed a security threat. [Read More]
Google on Monday released a security update for Nexus devices, aimed at resolving critical "Stagefright 2.0." vulnerabilities the media playback engine in Android. [Read More]
Silent Circle announced on Monday that it has started shipping its Blackphone 2 , the first component of its Enterprise Privacy Platform (EPP) announced earlier this year. [Read More]
BlackBerry announced plans Friday to sell an Android-powered smartphone, in the latest reboot effort from the faded star of the sector. [Read More]

FEATURES, INSIGHTS // Mobile Security

rss icon

Ryan Naraine's picture
Vinnie Liu from Bishop Fox joins Ryan Naraine on the podcast to warn businesses about the security risks associated with the new LinkedIn Intro application.
Torsten George's picture
Many security experts believe the next wave of enterprise hacking will be carried out via the mobile channel. What steps can be taken to maintain the productivity gains and cost-savings associated with BYOD, while proactively managing and mitigating security risks associated with this practice?
Ryan Naraine's picture
Costin Raiu of Kaspersky Lab's global research and analysis team talks about the global implications of the Icefog APT campaign and discloses that a major command-and-control shutdown is currently underway.
Michael Callahan's picture
The problem with this Internet of Things is that the manufacturers of "smart" devices are not always as concerned about security as we end-users might want them to be.
Ryan Naraine's picture
Jerry Bryant, Senior Security Strategist in the Microsoft Trustworthy Computing group chats about the company's thinking behind the expansion of the Microsoft Active Protections Program (MAPP).
Wade Williamson's picture
As security professionals, it’s our job to see around the corner whenever possible. While the sky is not falling, if controlling mobile malware isn’t on your radar, it definitely should be.
Ryan Naraine's picture
Security researchers Charlie Miller and Chris Valasek join the podcast to talk about their work hacking the into modern vehicles to manipulate steering, acceleration, speedometers and safety sensors.
Gant Redmon's picture
Being in a public place makes you fair game. So what makes a place private instead of public? This is where that famed “reasonable person” comes in.
Avi Chesla's picture
While Long Term Evolution (LTE) networks bring the promise of relieving traffic jams for mobile operators, they also entail new security risks.
Nick Cavalancia's picture
Company Owned, Personally Enabled devices (COPE) provide a high-degree of centralized control and monitoring while allowing employees to install consumerized, personal-use applications.