BYOD

Novel device registration trick enhances multi-stage phishing attacks

Microsoft has disclosed details of a large-scale phishing campaign using a novel device registration technique…

Which are most frequently blacklisted apps by enterprises?

Mobile security firm Appthority published an interesting report that revealed which Android and iOS applications…

5 Guidelines in Battling Cyber Criminals Over Precious Business Data

5 Guidelines in Battling Cyber Criminals Over Precious Business Data, lets's try to understand how…

Company’s data at risk due to the use of mobile gambling apps

Veracode has conducted a research on the security of several mobile gambling apps and discovered…

How Employees Become Pawns for Hackers

Employees are the greatest security risks, especially since they are prone to be used as…

2,400 unsafe applications found in average large enterprise

A recent study published by Veracode on mobile security revealed that 2,400 unsafe applications are…

Defending Against Spear Phishing, RAT Deployment and Email Tracking

Gary Miliefsky explain how Spear Phishing works as well as Email Tracking that allow the…

Cybercriminals are increasingly targeting web-connecting Devices including Home Appliances

 As we look forward to 2015, it’s had to forget the complex bugs, data breaches…

Be aware, Apple iOS Data protection doesn’t protect email attachments

Security Researcher Andreas Kurtz noticed that email attachments within different iOS versions are not protected by…

Android vulnerability makes 99% of mobile devices attackable

Bluebox Labs recently discovered an Android vulnerability in the OS's security model that allows hackers…

This website uses cookies.