Tag: Mobile Security

  • iOS 11 in the Enterprise: Get Your iPads Ready

    While some are still in back-to-school mode and others are getting ready for some football, we’ve been gearing up for the latest mobile operating systems to hit the market. Today, Apple released its most advanced mobile operating system (OS) yet — iOS 11 — meaning time is of the essence for IT & Security leaders…

  • Flaws Patched in Trend Micro Mobile Security for Enterprise

    A patch released last week by Trend Micro for its Mobile Security for Enterprise product resolves several vulnerabilities, including remote code execution issues rated critical and high severity. Read full news article on SecurityWeek  

  • Threat Report Says 1 in 50 iOS Apps Could Leak Data

    A new global threat report for the mobile ecosystem shows that iOS provides a bigger threat than is often perceived. While the insecurities of the Android operating system are well-documented, the report notes that 1 in 50 iOS apps used in enterprise environments could potentially leak sensitive data. Read full news article on SecurityWeek  

  • Millions Download “ExpensiveWall” Malware via Google Play

    The total number of affected users, Check Point says, could be between 5.9 million and 21.1 million, as ExpensiveWall iw a variant of malware found in Google Play earlier this year. Unlike previous iterations, however, the new sample uses advanced obfuscation techniques to evade Google Play’s built-in anti-malware protections. Read full news article on SecurityWeek…

  • Apple Brings FaceID to New iPhone X

    At the Apple Special Event 2017, Apple announced on Tuesday three new iPhones (X, 8 and 8 Plus), the Apple Watch Series 3, the new Apple TV 4K — and new software in the form of iOS 11 and WatchOS 4. Star of the show, however, is the new iPhone X (pronounced ‘ten’) that marks…

  • Software and the acceleration of payment security

    As the way payments are accepted continues to change, the PCI SSC is constantly looking at how we can support these advancements in payments with security standards to protect payment data.   This article is published as part of the IDG Contributor Network. Read full news article on CSOONLINE.com  

  • Android Click-Fraud App Repurposed as DDoS Botnet

    The McAfee Mobile Research Team tracks the behavior of Android click-fraud apps. We have detected multiple implementations, including recent examples on Google Play in 2016 and Clicker.BN last month. Read full news article on McAfee Labs  

  • Billions of Devices Potentially Exposed to New Bluetooth Attack

    A hacker who is in range of the targeted device can exploit one of the several Bluetooth implementation vulnerabilities that can lead to remote code execution, information disclosure or man-in-the-middle (MitM) attacks. The attacker only needs to determine what type of operating system the target is using in order to deploy an exploit specific to…

  • Unless you patch or your Android runs Oreo, you might OK your own pwnage

    Researchers revealed a new high-severity vulnerability affecting the Google Android platform which could result in users actually agreeing for their Androids to be pwned. While no one in their right mind would do that on purpose, they might do it on accident since it is an overlay attack. Read full news article on CSOONLINE.com  

  • How to protect your email account from Equifax hackers in 5 minutes

    If the Equifax breach caused 143 million U.S. consumers to have their email credentials, Social Security numbers and birth dates, plus other personal information accessible to hackers, then that equates to roughly 55% of Americans age 18 or older who have been affected, according to an article in The Wall Street Journal. Read full news article…

  • Mini book: The Morning Paper Issue 6 – Computer Science Applied

    Subtle production failures running Microsoft Azure, identifying users from aggregated mobile data, taking over a city with Philips Hue lightbulbs, processing a trillion edge graph on a single machine, and why Rust should be your systems language of choice. Read full news article on InfoQ  

  • Samsung Offers Up to $200,000 in Bug Bounty Program

    Depending on the severity level of the disclosed vulnerabilities, bug bounties will range between $200 and $200,000. Should vulnerability reports be submitted without a valid Proof-of-Concept, Samsung will decide the qualification for a reward according to reproducibility and severity of the issue, and might significantly reduce the reward amount. Read full news article on SecurityWeek…