Please turn on your JavaScript for this page to function normally.
Samsung users could be locked out of their devices by attackers

A zero-day flaw in Samsung’s Find My Mobile system that can be extremely easily exploited to remotely lock a target’s phone has been uncovered by programmer and …

40% of enterprise employees use personal devices for work

Approximately 40 percent of U.S. consumers who work for large enterprises said they use their personally owned smartphone, desktop or laptop daily for some form of work …

What all major brands share in common with the Snappening

By now we have all heard about “The Snappening”—hyped as a high-profile data breach involving the photo-sharing application Snapchat. Virtually every news outlet …

Detecting cyber attacks in a mobile and BYOD organization

Mobile devices – laptops, tablets and smartphones – have been part of the information technology culture for some time. Enabling employees and contractors to bring …

Leaked Snapchat images came from third-party server

Snapchat is a mobile photo messaging app that allows users to send pictures that “self-destruct” a few moments after being viewed, and is especially popular with …

Education is the key to increasing mobile security

The swathes of high-profile security breaches in recent months have only served to highlight the need to educate the public on the inadequacies of the security systems …

Kali NetHunter turns Nexus devices into portable hacking tools

Offensive Security, the security training company behind Kali Linux, the popular Debian-based OS designed for digital forensics and penetration testing, and Kali community …

Companies becoming lax in managing BYOD risk

Exposure to risk is as much of a threat today as it was in 2013; however, organizations have become less diligent in BYOD management and mitigation, according to TEKsystems. …

Minimizing privacy risks of location data collection

With the advent of smartphones and tablets – devices users often carry with them everywhere they go – collected location data became a valuable source of …

Mobile device security is sacrificed for workforce efficiency

While mobile devices are an integral part of the workplace, the cyber security practices and budgets in most organizations are not keeping pace with the growing number of …

Security compliance is necessary for real-time mobile data access

Security compliance often varies from organisation to organisation due to varied industry regulation as well as internal security policies and procedures. We often see …

(IN)SECURE Magazine issue 43 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 43 has been released today. Table of contents: …

Don't miss

Cybersecurity news