BYOD

Novel device registration trick enhances multi-stage phishing attacks

Microsoft has disclosed details of a large-scale phishing campaign using a novel device registration technique to target other enterprises. Microsoft…

3 years ago

Which are most frequently blacklisted apps by enterprises?

Mobile security firm Appthority published an interesting report that revealed which Android and iOS applications are most frequently blacklisted by…

7 years ago

5 Guidelines in Battling Cyber Criminals Over Precious Business Data

5 Guidelines in Battling Cyber Criminals Over Precious Business Data, lets's try to understand how to Ensure Enterprise Security. You…

9 years ago

Company’s data at risk due to the use of mobile gambling apps

Veracode has conducted a research on the security of several mobile gambling apps and discovered a number of flaws that…

9 years ago

How Employees Become Pawns for Hackers

Employees are the greatest security risks, especially since they are prone to be used as pawns for hackers. That's why…

9 years ago

2,400 unsafe applications found in average large enterprise

A recent study published by Veracode on mobile security revealed that 2,400 unsafe applications are in average installed in large…

10 years ago

Defending Against Spear Phishing, RAT Deployment and Email Tracking

Gary Miliefsky explain how Spear Phishing works as well as Email Tracking that allow the sender to collect very useful…

10 years ago

Cybercriminals are increasingly targeting web-connecting Devices including Home Appliances

 As we look forward to 2015, it’s had to forget the complex bugs, data breaches and Privacy violations that have…

10 years ago

Be aware, Apple iOS Data protection doesn’t protect email attachments

Security Researcher Andreas Kurtz noticed that email attachments within different iOS versions are not protected by Apple's data protection mechanisms. Mobile…

10 years ago

Android vulnerability makes 99% of mobile devices attackable

Bluebox Labs recently discovered an Android vulnerability in the OS's security model that allows hackers to attack 99% of Android…

11 years ago

This website uses cookies.