Security Experts:

Mobile & Wireless
long dotted

NEWS & INDUSTRY UPDATES

Android ransomware embedded in apps on Google Play threatens victims to sell their personal data on the black market if they don’t pay, Check Point security researchers warn. [Read More]
The source code of Android banking Trojan BankBot, along with instructions on how to use it, recently emerged on a hacker forum. [Read More]
A newly discovered variant of the HummingBad Android malware called "HummingWhale" has been downloaded millions of times after infecting 20 applications in Google Play. [Read More]
A security vulnerability that allowed a privileged attacker to arbitrary write values within kernel space lurked in Nexus 9’s kernel for two years before being patched, IBM security researchers reveal. [Read More]
Some third-party applications unnecessarily store keys or secrets that could be abused to leak a variety of user credentials and other type of sensitive data, software security startup Fallible warns. [Read More]
The infamous DroidJack RAT has been found masquerading as the unreleased Super Mario Run game for Android. [Read More]
St. Jude Medical has patched some of the vulnerabilities found by MedSec, but the vendor insists the risk of cyberattacks is extremely low [Read More]
A vulnerability recently addressed in Google’s January 2017 Android security bulletin was a denial of service (DoS) flaw in bootloader, which could be exploited to target Nexus 6 and 6P custom boot modes, IBM security researchers reveal. [Read More]
The Android Marcher Trojan was recently observed masquerading as the recently released Super Mario Run mobile game for Apple’s iOS. [Read More]
FTC files lawsuit against D-Link, accusing the vendor of making false claims about how secure its products are [Read More]

FEATURES, INSIGHTS // Mobile & Wireless

rss icon

Adam Ely's picture
When determining how risky an app is, we must consider intentional features within these permissions to determine whether or not they’re a risk to the enterprise.
Adam Ely's picture
At the end of the day, the kill switch will not only decrease the amount of people mugged for their phones because there is little net value in the device itself, but it will also provide individuals with the means to wipe the device of personal information.
Adam Ely's picture
COPE is often an attractive model for organizations concerned about keeping mobile data secure but presents its own set of issues. So how does COPE stack up against BYOD?
Adam Ely's picture
This shift to mobile exposes a major fault that needs to be addressed and security practices must address mobile threats as well.
Marc Solomon's picture
To help cybersecurity professionals cut through the hype and gain a better understanding of what to expect as the Internet of Everything continues to evolve, these top 10 observations might help.
Adam Ely's picture
Yesterday’s device management approach does not work in a BYOD world. The end users are bringing their own devices, so we need to adjust to accommodate this new world order.
Adam Ely's picture
Security teams and lines of business have reached a turning point on BYOD. It’s now become more important than ever for the CISO to figure out how to manage risk without inhibiting users.
Adam Ely's picture
Many of us create our own blind spots through assumption. Until we understand what is occurring on mobile devices, we cannot determine if our controls are effective at managing risk.
Adam Ely's picture
CISOs are notoriously disliked. Trying to protect company, customer and employee data often means having to say “no” to new projects and implementations. This does not earn you many friends.
Ryan Naraine's picture
John Hultquist, Manager of Cyber Espionage Threat Intelligence at ISIGHT Partners, joins the podcast to talk about "NEWSCASTER," a cyber espionage operation that uses fictitious social media accounts to launch attacks.