Security Experts:

Mobile & Wireless
long dotted

NEWS & INDUSTRY UPDATES

Russia-linked cyberespionage group Fancy Bear (aka APT28 and Pawn Storm) tracked Ukrainian troops using Android malware [Read More]
Firmware controlling dozens of Android mobile device models incorporates Trojans capable of covertly downloading and installing other programs, security firm Doctor Web has revealed. [Read More]
Netgear releases firmware updates to address a critical command injection vulnerability found in its routers [Read More]
IT systems connected to pagers leak data that can be highly valuable for conducting reconnaissance [Read More]
A newly discovered attack that abuses the Dirty COW vulnerability in Linux kernel can be leveraged to write malicious code directly into processes, Trend Micro security researchers reveal. [Read More]
Google this week released the December 2016 set of monthly patches for the Android platform which resolved a total of 74 vulnerabilities, 11 which were rated Critical severity. [Read More]
Vulnerabilities in the Android remote management tool AirDroid potentially impact over 50 million devices, security researchers at Zimperium zLabs warn. [Read More]
Researchers discovered a bug that can be used to bypass the Activation Lock feature enabled on lost or stolen iPhones and iPads [Read More]
Android Trojan named SmsSecurity has been used by cybercriminals to target the customers of several banks in Europe [Read More]
Gooligan Android malware can steal authentication tokens stored on devices which can be used to access sensitive data from Gmail, Google Photos, Google Docs and other services, including G Suite [Read More]

FEATURES, INSIGHTS // Mobile & Wireless

rss icon

Adam Ely's picture
When determining how risky an app is, we must consider intentional features within these permissions to determine whether or not they’re a risk to the enterprise.
Adam Ely's picture
At the end of the day, the kill switch will not only decrease the amount of people mugged for their phones because there is little net value in the device itself, but it will also provide individuals with the means to wipe the device of personal information.
Adam Ely's picture
COPE is often an attractive model for organizations concerned about keeping mobile data secure but presents its own set of issues. So how does COPE stack up against BYOD?
Adam Ely's picture
This shift to mobile exposes a major fault that needs to be addressed and security practices must address mobile threats as well.
Marc Solomon's picture
To help cybersecurity professionals cut through the hype and gain a better understanding of what to expect as the Internet of Everything continues to evolve, these top 10 observations might help.
Adam Ely's picture
Yesterday’s device management approach does not work in a BYOD world. The end users are bringing their own devices, so we need to adjust to accommodate this new world order.
Adam Ely's picture
Security teams and lines of business have reached a turning point on BYOD. It’s now become more important than ever for the CISO to figure out how to manage risk without inhibiting users.
Adam Ely's picture
Many of us create our own blind spots through assumption. Until we understand what is occurring on mobile devices, we cannot determine if our controls are effective at managing risk.
Adam Ely's picture
CISOs are notoriously disliked. Trying to protect company, customer and employee data often means having to say “no” to new projects and implementations. This does not earn you many friends.
Ryan Naraine's picture
John Hultquist, Manager of Cyber Espionage Threat Intelligence at ISIGHT Partners, joins the podcast to talk about "NEWSCASTER," a cyber espionage operation that uses fictitious social media accounts to launch attacks.