Microsoft has disclosed details of a large-scale phishing campaign using a novel device registration technique to target other enterprises. Microsoft has shared details of a large-scale phishing campaign that leverages stolen credentials to register devices on a target’s network to extend the attack to other enterprises. The attack exploits the concept of bring-your-own-device (BYOD) by […]
Mobile security firm Appthority published an interesting report that revealed which Android and iOS applications are most frequently blacklisted by enterprises. The company Appthority has published an interesting report that reveals which mobile apps, both Android and iOS, are most frequently blacklisted by enterprises. “The mobile ecosystem in an enterprise comprises apps from managed devices, BYOD and COPE. Appthority compiled […]
5 Guidelines in Battling Cyber Criminals Over Precious Business Data, lets’s try to understand how to Ensure Enterprise Security. You would think that a company that stores their clientsâ money and handles investments would have tight security measures on their system against cyber attacks. Apparently, this is not always the case. In 2014, Scottrade, a […]
Veracode has conducted a research on the security of several mobile gambling apps and discovered a number of flaws that expose enterprises to serious risks. If you belong to a global corporation, the most probably think you will find out is that some of your colleagues have installed mobile apps that donât belong to the […]
Employees are the greatest security risks, especially since they are prone to be used as pawns for hackers. That’s why they are vulnerable to attacks. Mobile technology has changed the landscape of business these days. It has enabled employees to set up virtual offices, have more work flexibility, and even extend working on their own […]
A recent study published by Veracode on mobile security revealed that 2,400 unsafe applications are in average installed in large enterprise. Mobile devices are becoming an integral part of the enterprise architecture, security depends heavily on the use that is made with mobile devices and from the policies adopted to protect the company from cyber […]
Gary Miliefsky explain how Spear Phishing works as well as Email Tracking that allow the sender to collect very useful data on the recipient. Defending Against Spear Phishing, RAT Deployment and Email Tracking In my 2015:Year of the RAT Threat Report (see: http://www.snoopwall.com/reports/), Â I described how I felt Sony Pictures Entertainment (SPE) was attacked by […]
 As we look forward to 2015, itâs had to forget the complex bugs, data breaches and Privacy violations that have marred the Tech world in the ending year. Symantec Security firm now projects doom for 2015, warning that attacks will get Smarter and sharper. Itâs the end of the year, a perfect time to look […]
Security Researcher Andreas Kurtz noticed that email attachments within different iOS versions are not protected by Apple’s data protection mechanisms. Mobile platform security is becoming even more crucial due to the large number of applications daily used by billion of users, but we must be aware of security flaws that could also affect the mobile OS. […]
Bluebox Labs recently discovered an Android vulnerability in the OS’s security model that allows hackers to attack 99% of Android devices on the market. Android vulnerability allows app modification preserving signatures … this is the shocking discovery announced by Bluebox Labs. During this week we have had the opportunity to discuss about mobile botnets and […]