Search results for: Android VPN

Symantec ISTR

Formjacking is the new get rich quick scheme for cybercriminals

Faced with diminishing returns from ransomware and cryptojacking, cybercriminals are doubling down on alternative methods, such as formjacking, to make money according to Symantec’s Internet Security Threat Report (ISTR), Volume 24. Symantec’s ISTR provides an overview of the threat landscape, including insights into global threat activity, cybercriminal trends, and motivations for attackers. The report analyzes data from Symantec’s Global Intelligence Network, which records events from 123 million attack sensors worldwide, blocks 142 million threats daily … More


Facebook to shut down iOS app that allowed for near total data access

When Apple banned its Onavo VPN app from its App Store last summer, Facebook took repackaged the app, named it “Facebook Research” and offered it for download through three app beta testing services, TechCrunch has discovered. About the Facebook Research app Facebook used the Onavo app to collect the aforementioned data of both Android and iOS users and, based on the information gleaned from it, made decisions to acquire competing apps and add popular features … More

HID Global releases Crescendo Mobile smart card

HID Global released the Crescendo Mobile smart card to bring convenience to security for accessing computer, network or cloud applications. The new HID mobile smart card utilizes digital certificates on users’ mobile devices for client authentication. HID Crescendo Mobile provides organizations seeking to eliminate passwords with a solution that combines the security of physical authenticators with the usability of a mobile solution. Crescendo Mobile works similarly to, and is compatible with, secure Crescendo smart cards; … More


New infosec products of the week​: October 19, 2018

IBM rolls out cybersecurity operations center on wheels IBM Security launched the mobile Security Operations Center, capable of traveling onsite for cybersecurity training, preparedness, and response. The IBM X-Force Command Cyber Tactical Operations Center will travel around the U.S. and Europe, running incident response drills with clients, providing on-demand cybersecurity support, and building cybersecurity awareness and skills with professionals, students and consumers. Trend Micro redefines endpoint security with Trend Micro Apex One Trend Micro Apex … More

New Zyxel NebulaFlex Switches offer the choice of cloud management or stand alone web management

Zyxel Communications has enhanced the versatility and management of their networking solutions with the announcement of two new NebulaFlex hybrid Gigabit Ethernet Smart Managed Switches. Two new “hybrid” switches join NebulaFlex familiy The Gigabit Ethernet Smart Managed Switch (GS1920v2) and Gigabit Ethernet Smart Managed Switch with 10G Uplink (XGS1930) were introduced as the newest members of Zyxel’s NebulaFlex family of hybrid networking products. The new switches can be used as standalone web managed switches or … More

Digital Security by ADT launches identity protection nationwide

ADT announced Digital Security by ADT, a new cybersecurity service that will protect a customer’s personal identity, digital data, home network and financial information. Identity protection will be available on ADT’s e-Commerce platform, providing convenience and clarity for customers to shop for their security needs when and how they want. “Since ADT began in 1874, our mission has been to help keep families and homes safe,” said Jim DeVries, current President and incoming CEO of … More

Venafi Enterprise Mobility Protect delivers visibility and machine identity on mobile endpoints

Venafi announced Venafi Enterprise Mobility Protect, a solution that safeguards the machine identities used on endpoints that access enterprise networks and resources. Venafi Enterprise Mobility Protect will be available on July 2, 2018 and delivers visibility and machine identity intelligence across all authorized mobile devices, including those that are owned by employees (Bring Your Own Device or BYOD). With Venafi Enterprise Mobility Protect, organizations can protect the machine identities on mobile endpoints by managing device … More

abstract, generic

Week in review: VPNFilter, hacking BMW cars, verifying data processing for privacy and GDPR

Here’s an overview of some of last week’s most interesting news and articles: The percentage of open source code in proprietary apps is rising The number of open source components in the codebase of proprietary applications keeps rising and with it the risk of those apps being compromised by attackers leveraging vulnerabilities in them, a recent report has shown. VPNFilter malware compromises over 500,000 networking devices around the world Cisco Talos researchers have flagged a … More


Researchers uncover mobile, PC surveillance platform tied to different nation-state actors

The Electronic Frontier Foundation (EFF) and mobile security company Lookout have uncovered a new malware espionage campaign that has targeted activists, journalists, lawyers, military personnel, and enterprises in more than 20 countries in North America, Europe, the Middle East, and Asia. They have dubbed the threat Dark Caracal, and have traced its activities to as far back as 2012. The malware used by Dark Caracal The attackers went after information stored on targets’ Android devices … More


How secure are cryptocurrency mobile apps?

Are the mobile apps you’re using to store or handle your cryptocurrency stash, track the currencies’ price, or interact with cryptocurrency exchanges secure? Judging by the results of a recent audit by High-Tech Bridge, the chances are slim. The security outfit has put 90 Android apps available for download on Google Play through the wringer – i.e. its Mobile X-Ray service that performs dynamic, static and interactive testing of mobile applications for security and privacy … More


Week in review: Risk assessment, fileless attacks, and the most hackable holiday gifts

Here’s an overview of some of last week’s most interesting news and articles: Review: EU GDPR Documentation Toolkit The General Data Protection Regulation (GDPR) aims to strengthen data protection for all individuals within the EU (citizens and residents). It was adopted in April 2016, and it becomes enforceable from 25 May 2018. Sneaky malware downloader found in apps on Google Play Google has removed from Google Play eight apps that have served as downloaders for … More

Cato Networks

Review: Cato Cloud

The Innovation Sandbox at the RSA Conference is one of the show’s events that I never miss. Back in February, I watched through the demos and live presentations of Cato Networks, one of the event’s ten finalists. Even in a room packed with innovative technologies, their solution – described as “network + security as a service” – definitely stood out. Cato Cloud is a custom-built, SLA-backed backbone that provides global organizations a one-stop solution for … More