Security Experts:

Mobile & Wireless
long dotted

NEWS & INDUSTRY UPDATES

Several undocumented forensic services running on all iOS devices can be leveraged as attack points and surveillance mechanisms, a security researcher revealed at the Hope X conference.
SMS-based two-factor authentication (2FA) mechanisms used by banks to secure their customers' accounts have been bypassed by cybercriminals using a combination of malware, mobile apps, rogue DNS servers, and phishing sites, according to a report from Trend Micro.
Apple is fighting Chinese claims that the iPhone threatens national security through its ability to track and time-stamp a user's location.
Chinese state broadcaster CCTV has accused US technology giant Apple of threatening national security through its iPhone's ability to track and time-stamp a user's location.
Silent Circle now allows customers to make encrypted voice calls in a total of 79 countries, the company announced on Thursday.
SGP Technologies SA, the Switzerland-based joint venture of Silent Circle and Geeksphone, announced on Monday that Blackphone handsets are now available.
A presentation at the upcoming Black Hat security conference will touch on the use of software-defined radio in blind signal analysis focused on targets from restaurant pager systems to airport radars.
A new SMS worm dubbed "Selfmite" has been infecting Android devices in a pay-per-install scheme that abuses advertising services.
Zach Lanier, senior security researcher at Duo Security, talks about a gaping hole in the way two-factor authentication is implemented in the PayPal mobile app (iOS and Android).
Organizations need to expand their mobile worldview to include data leakage, insider threats, and mobile malware and develop incident response plans that consider mobile devices.

FEATURES, INSIGHTS // Mobile & Wireless

rss icon

Ryan Naraine's picture
Vinnie Liu from Bishop Fox joins Ryan Naraine on the podcast to warn businesses about the security risks associated with the new LinkedIn Intro application.
Jon-Louis Heimerl's picture
Security is a creature of habit. Security likes things to stay the same. Change brings chaos. Chaos is bad for security. But, we can help control the security of our environment by following good security habits.
Torsten George's picture
Many security experts believe the next wave of enterprise hacking will be carried out via the mobile channel. What steps can be taken to maintain the productivity gains and cost-savings associated with BYOD, while proactively managing and mitigating security risks associated with this practice?
Ryan Naraine's picture
Costin Raiu of Kaspersky Lab's global research and analysis team talks about the global implications of the Icefog APT campaign and discloses that a major command-and-control shutdown is currently underway.
Michael Callahan's picture
The problem with this Internet of Things is that the manufacturers of "smart" devices are not always as concerned about security as we end-users might want them to be.
Ryan Naraine's picture
Jerry Bryant, Senior Security Strategist in the Microsoft Trustworthy Computing group chats about the company's thinking behind the expansion of the Microsoft Active Protections Program (MAPP).
Wade Williamson's picture
As security professionals, it’s our job to see around the corner whenever possible. While the sky is not falling, if controlling mobile malware isn’t on your radar, it definitely should be.
Ryan Naraine's picture
Security researchers Charlie Miller and Chris Valasek join the podcast to talk about their work hacking the into modern vehicles to manipulate steering, acceleration, speedometers and safety sensors.
Gant Redmon's picture
Being in a public place makes you fair game. So what makes a place private instead of public? This is where that famed “reasonable person” comes in.
Avi Chesla's picture
While Long Term Evolution (LTE) networks bring the promise of relieving traffic jams for mobile operators, they also entail new security risks.