A successor of the Exobot Android trojan, Octo was recently updated with remote access capabilities, which allows operators to perform on-device fraud. [Read More]
Apple is being called to task for neglecting to patch two "actively exploited" zero-day vulnerabilities on older versions of its flagship macOS platform. [Read More]
Four months since the Log4j issue exploded onto the internet, all the major affected vendors have released patches – but even where companies have patched, security experts warn it's a mistake to relax. [Read More]
Apple’s security response team on Thursday released emergency patches to cover a pair of “actively exploited” vulnerabilities affecting macOS, iOS and iPadOS devices. [Read More]
Researchers have intercepted a destructive wiper malware dubbed "AcidRain" that is hitting routers and modems with digital breadcrumbs suggesting a link to the devastating Viasat hack that took down wind turbines in Germany. [Read More]
Mobile security firm Zimperium will be acquired for roughly $525 million by Liberty Strategic Capital, the private equity firm founded by Steven T. Mnuchin, former Treasury Secretary under President Donald Trump. [Read More]
An early-stage startup selling a security-themed browser to businesses is a cybersecurity unicorn less than two months after emerging from stealth with $100 million in funding. [Read More]
The problem with this Internet of Things is that the manufacturers of "smart" devices are not always as concerned about security as we end-users might want them to be.
Jerry Bryant, Senior Security Strategist in the Microsoft Trustworthy Computing group chats about the company's thinking behind the expansion of the Microsoft Active Protections Program (MAPP).
As security professionals, it’s our job to see around the corner whenever possible. While the sky is not falling, if controlling mobile malware isn’t on your radar, it definitely should be.
Security researchers Charlie Miller and Chris Valasek join the podcast to talk about their work hacking the into modern vehicles to manipulate steering, acceleration, speedometers and safety sensors.
Company Owned, Personally Enabled devices (COPE) provide a high-degree of centralized control and monitoring while allowing employees to install consumerized, personal-use applications.
There is no way to deal with the risk that BYOD brings. Between Android and iOS, there are millions of apps readily available for download, countless numbers of which open up doors in BYOD technologies that hackers and cybercriminals can easily stroll through.
From a security perspective, most consumer devices and services leave much to be desired. The tools at the disposal of security professionals for dealing with consumerization are quite limited and include the ability to Block it, Wrap it, or Allow it and pray.
The BYOD problem isn’t even about BYOD; it’s about the ability to visualize, understand, and control your whole infrastructure, including this latest addition to the network map.