mobile devices
Why you should protect your wireless connection
It’s holiday shopping season again, and consumers will join the rush to buy devices and accessories for loved ones. They’ll scoop up phones and tablets, plus …
Mobile Pwn2Own 2014: Windows Phone’s sandbox resists attack
The Mobile Pwn2Own 2014 hacking competition, held at the PacSec Applied Security Conference in Tokyo, Japan, was concluded on Thursday, and not one of the targeted phones has …
Many IT pros store compromising material on their mobile phones
It appears that Jennifer Lawrence is not the only one with risqué photos on her mobile device. According to a new survey from ESET, 39 percent of the UK’s leading IT …
Mobile security breaches impacted 68% of organizations
Mobile security breaches have affected 68 percent of organizations in the last 12 months, according to a new global study from BT. Despite this, organizations are still not …
Extracting data from air-gapped computers via mobile phones
A group of researchers from the Department of Information Systems Engineering at Ben-Gurion University in Israel have demonstrated and detailed a technique that can allow …
Over one-third of all enterprise data leakage policy violations occur on mobile devices
Nearly half of all cloud app activities and more than one-third of all data leakage policy violations occur on mobile devices, say the results of the October 2014 Netskope …
Samsung users could be locked out of their devices by attackers
A zero-day flaw in Samsung’s Find My Mobile system that can be extremely easily exploited to remotely lock a target’s phone has been uncovered by programmer and …
40% of enterprise employees use personal devices for work
Approximately 40 percent of U.S. consumers who work for large enterprises said they use their personally owned smartphone, desktop or laptop daily for some form of work …
What all major brands share in common with the Snappening
By now we have all heard about “The Snappening”—hyped as a high-profile data breach involving the photo-sharing application Snapchat. Virtually every news outlet …
Detecting cyber attacks in a mobile and BYOD organization
Mobile devices – laptops, tablets and smartphones – have been part of the information technology culture for some time. Enabling employees and contractors to bring …
Leaked Snapchat images came from third-party server
Snapchat is a mobile photo messaging app that allows users to send pictures that “self-destruct” a few moments after being viewed, and is especially popular with …
Education is the key to increasing mobile security
The swathes of high-profile security breaches in recent months have only served to highlight the need to educate the public on the inadequacies of the security systems …
Featured news
Resources
Don't miss
- Chinese cyber spies are using Ivanti EPMM flaws to breach EU, US organizations
- TikTok videos + ClickFix tactic = Malware infection
- DanaBot botnet disrupted, QakBot leader indicted
- Is privacy becoming a luxury? A candid look at consumer data use
- Unpatched Windows Server vulnerability allows full domain compromise