Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

According to a report from Arxan Technologies, hacked versions of 97% of the top 100 paid Android apps and 87% of the top 100 paid Apple iOS apps appear in unofficial app stores and app distribution sites.
Three individuals suspected of being involved in the creation and distribution of a recently uncovered piece of malware referred to as "WireLurker" have been arrested and charged, the Beijing Municipal Bureau of Public Security said on Friday.
BlackBerry announced several new offerings targeted to its enterprise customers, including two identity and access solutions, along with a new enterprise mobility management (EMM) solution.
Snapchat has started actively warning users when the use of a third party app is detected.
Researchers hacked several of the latest popular smartphones during the Mobile Pwn2Own competition that took place alongside the PacSec Applied Security Conference in Tokyo on November 12-13.
Researchers have identified an older variant of the recently uncovered WireLurker OS X/iOS malware which appears to have been designed to target computers running Microsoft Windows.
A universal cross-site scripting (UXSS) vulnerability has been identified in the Android browser that’s installed by default on many Android smartphones.
Samsung has published a statement explaining the conditions that need to be met in order to exploit a vulnerability that can be used to lock and unlock mobile devices.
North Korea's state media on Monday blasted South Korea's spy agency for alleging that Pyongyang hacked tens of thousands of smartphones in the South using malware disguised in mobile gaming apps.
Until recently, cybercriminals could have hijacked the account of any GroupMe user simply by knowing the phone number connected to the targeted account, a researcher reported.

FEATURES, INSIGHTS // Mobile Security

rss icon

Wade Williamson's picture
As security professionals, it’s our job to see around the corner whenever possible. While the sky is not falling, if controlling mobile malware isn’t on your radar, it definitely should be.
Ryan Naraine's picture
Security researchers Charlie Miller and Chris Valasek join the podcast to talk about their work hacking the into modern vehicles to manipulate steering, acceleration, speedometers and safety sensors.
Gant Redmon's picture
Being in a public place makes you fair game. So what makes a place private instead of public? This is where that famed “reasonable person” comes in.
Avi Chesla's picture
While Long Term Evolution (LTE) networks bring the promise of relieving traffic jams for mobile operators, they also entail new security risks.
Nick Cavalancia's picture
Company Owned, Personally Enabled devices (COPE) provide a high-degree of centralized control and monitoring while allowing employees to install consumerized, personal-use applications.
Nick Cavalancia's picture
There is no way to deal with the risk that BYOD brings. Between Android and iOS, there are millions of apps readily available for download, countless numbers of which open up doors in BYOD technologies that hackers and cybercriminals can easily stroll through.
Nimmy Reichenberg's picture
From a security perspective, most consumer devices and services leave much to be desired. The tools at the disposal of security professionals for dealing with consumerization are quite limited and include the ability to Block it, Wrap it, or Allow it and pray.
Dr. Mike Lloyd's picture
The BYOD problem isn’t even about BYOD; it’s about the ability to visualize, understand, and control your whole infrastructure, including this latest addition to the network map.
Nimmy Reichenberg's picture
While BYOD is concerned with the risk from personal devices, BYON (Bring Your Own Network) is a different type of risk
Jon-Louis Heimerl's picture
If regulatory protected information gets onto your device, you are obligated to protect it. Are you fully prepared to guarantee that everything you are doing on your personally managed device meets the obligations of you and your organization to protect sensitive information?