Security Experts:

long dotted


A successor of the Exobot Android trojan, Octo was recently updated with remote access capabilities, which allows operators to perform on-device fraud. [Read More]
Starting November 2022, all applications will be required to target “an API level within two years of the latest major Android release.” [Read More]
SharkBot can steal user credentials and initiate unauthorized money transfers. [Read More]
Apple is being called to task for neglecting to patch two "actively exploited" zero-day vulnerabilities on older versions of its flagship macOS platform. [Read More]
Posing as Process Manager, the malware asks for extensive permissions and has data theft and user tracking capabilities. [Read More]
Four months since the Log4j issue exploded onto the internet, all the major affected vendors have released patches – but even where companies have patched, security experts warn it's a mistake to relax. [Read More]
Apple’s security response team on Thursday released emergency patches to cover a pair of “actively exploited” vulnerabilities affecting macOS, iOS and iPadOS devices. [Read More]
Researchers have intercepted a destructive wiper malware dubbed "AcidRain" that is hitting routers and modems with digital breadcrumbs suggesting a link to the devastating Viasat hack that took down wind turbines in Germany. [Read More]
Mobile security firm Zimperium will be acquired for roughly $525 million by Liberty Strategic Capital, the private equity firm founded by Steven T. Mnuchin, former Treasury Secretary under President Donald Trump. [Read More]
An early-stage startup selling a security-themed browser to businesses is a cybersecurity unicorn less than two months after emerging from stealth with $100 million in funding. [Read More]

FEATURES, INSIGHTS // Mobile Security

rss icon

Michael Callahan's picture
The problem with this Internet of Things is that the manufacturers of "smart" devices are not always as concerned about security as we end-users might want them to be.
Ryan Naraine's picture
Jerry Bryant, Senior Security Strategist in the Microsoft Trustworthy Computing group chats about the company's thinking behind the expansion of the Microsoft Active Protections Program (MAPP).
Wade Williamson's picture
As security professionals, it’s our job to see around the corner whenever possible. While the sky is not falling, if controlling mobile malware isn’t on your radar, it definitely should be.
Ryan Naraine's picture
Security researchers Charlie Miller and Chris Valasek join the podcast to talk about their work hacking the into modern vehicles to manipulate steering, acceleration, speedometers and safety sensors.
Gant Redmon's picture
Being in a public place makes you fair game. So what makes a place private instead of public? This is where that famed “reasonable person” comes in.
Avi Chesla's picture
While Long Term Evolution (LTE) networks bring the promise of relieving traffic jams for mobile operators, they also entail new security risks.
Nick Cavalancia's picture
Company Owned, Personally Enabled devices (COPE) provide a high-degree of centralized control and monitoring while allowing employees to install consumerized, personal-use applications.
Nick Cavalancia's picture
There is no way to deal with the risk that BYOD brings. Between Android and iOS, there are millions of apps readily available for download, countless numbers of which open up doors in BYOD technologies that hackers and cybercriminals can easily stroll through.
Nimmy Reichenberg's picture
From a security perspective, most consumer devices and services leave much to be desired. The tools at the disposal of security professionals for dealing with consumerization are quite limited and include the ability to Block it, Wrap it, or Allow it and pray.
Dr. Mike Lloyd's picture
The BYOD problem isn’t even about BYOD; it’s about the ability to visualize, understand, and control your whole infrastructure, including this latest addition to the network map.