mobile devices
Detecting cyber attacks in a mobile and BYOD organization
Mobile devices – laptops, tablets and smartphones – have been part of the information technology culture for some time. Enabling employees and contractors to bring …
Leaked Snapchat images came from third-party server
Snapchat is a mobile photo messaging app that allows users to send pictures that “self-destruct” a few moments after being viewed, and is especially popular with …
Education is the key to increasing mobile security
The swathes of high-profile security breaches in recent months have only served to highlight the need to educate the public on the inadequacies of the security systems …
Kali NetHunter turns Nexus devices into portable hacking tools
Offensive Security, the security training company behind Kali Linux, the popular Debian-based OS designed for digital forensics and penetration testing, and Kali community …
Companies becoming lax in managing BYOD risk
Exposure to risk is as much of a threat today as it was in 2013; however, organizations have become less diligent in BYOD management and mitigation, according to TEKsystems. …
Minimizing privacy risks of location data collection
With the advent of smartphones and tablets – devices users often carry with them everywhere they go – collected location data became a valuable source of …
Mobile device security is sacrificed for workforce efficiency
While mobile devices are an integral part of the workplace, the cyber security practices and budgets in most organizations are not keeping pace with the growing number of …
Security compliance is necessary for real-time mobile data access
Security compliance often varies from organisation to organisation due to varied industry regulation as well as internal security policies and procedures. We often see …
(IN)SECURE Magazine issue 43 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 43 has been released today. Table of contents: …
75% of mobile apps will fail basic security tests
Through 2015, more than 75 percent of mobile applications will fail basic security tests, according to Gartner. Enterprise employees download from app stores and use mobile …
5 key things to consider when developing an enterprise mobility management strategy
To state the obvious, business success today is dependent on an organization’s ability to empower its mobile workforce. Corporate resources – including …
Malicious and risky apps on Android and iOS
Knowingly or unknowingly to the user, some apps can collect GPS data, grab your contact information, your phone ID, email address, etc. In this podcast recorded at Black Hat …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)