Security researchers at mobile software company Cheetah Mobile have identified a piece of Android malware that's designed to steal the personal and financial details of South Korean online banking customers.
Bluebox Security unveiled the latest release of its flagship security platform this week, which now gives customers the ability to fortify mobile applications with self-defense capabilities, along with other new security features.
Researchers from Kaspersky Lab and Citizen Lab have uncovered new details on advanced surveillance tools offered by the Italian company HackingTeam, including never before seen implants for smartphones running on iOS and Android.
John Hultquist, Manager of Cyber Espionage Threat Intelligence at ISIGHT Partners, joins the podcast to talk about "NEWSCASTER," a cyber espionage operation that uses fictitious social media accounts to launch attacks.
In this podcast, Richard Boscovich, assistant general counsel in the Microsoft Digital Crimes Unit, talks about the new Microsoft Cybercrime Center and the ongoing battle to stop the proliferation of botnets around the world.
If you are going to analyze network traffic for hidden malware or look for anomalous behaviors that indicate an infection, you should be sure to include mobile devices and mobile malware in your efforts.
Many security experts believe the next wave of enterprise hacking will be carried out via the mobile channel. What steps can be taken to maintain the productivity gains and cost-savings associated with BYOD, while proactively managing and mitigating security risks associated with this practice?