BYOD

Novel device registration trick enhances multi-stage phishing attacksNovel device registration trick enhances multi-stage phishing attacks

Novel device registration trick enhances multi-stage phishing attacks

Microsoft has disclosed details of a large-scale phishing campaign using a novel device registration technique to target other enterprises. Microsoft…

3 years ago
Which are most frequently blacklisted apps by enterprises?Which are most frequently blacklisted apps by enterprises?

Which are most frequently blacklisted apps by enterprises?

Mobile security firm Appthority published an interesting report that revealed which Android and iOS applications are most frequently blacklisted by…

8 years ago
5 Guidelines in Battling Cyber Criminals Over Precious Business Data5 Guidelines in Battling Cyber Criminals Over Precious Business Data

5 Guidelines in Battling Cyber Criminals Over Precious Business Data

5 Guidelines in Battling Cyber Criminals Over Precious Business Data, lets's try to understand how to Ensure Enterprise Security. You…

10 years ago
Company’s data at risk due to the use of mobile gambling appsCompany’s data at risk due to the use of mobile gambling apps

Company’s data at risk due to the use of mobile gambling apps

Veracode has conducted a research on the security of several mobile gambling apps and discovered a number of flaws that…

10 years ago
How Employees Become Pawns for HackersHow Employees Become Pawns for Hackers

How Employees Become Pawns for Hackers

Employees are the greatest security risks, especially since they are prone to be used as pawns for hackers. That's why…

10 years ago
2,400 unsafe applications found in average large enterprise2,400 unsafe applications found in average large enterprise

2,400 unsafe applications found in average large enterprise

A recent study published by Veracode on mobile security revealed that 2,400 unsafe applications are in average installed in large…

10 years ago
Defending Against Spear Phishing, RAT Deployment and Email TrackingDefending Against Spear Phishing, RAT Deployment and Email Tracking

Defending Against Spear Phishing, RAT Deployment and Email Tracking

Gary Miliefsky explain how Spear Phishing works as well as Email Tracking that allow the sender to collect very useful…

10 years ago
Cybercriminals are increasingly targeting web-connecting Devices including Home AppliancesCybercriminals are increasingly targeting web-connecting Devices including Home Appliances

Cybercriminals are increasingly targeting web-connecting Devices including Home Appliances

 As we look forward to 2015, it’s had to forget the complex bugs, data breaches and Privacy violations that have…

11 years ago
Be aware, Apple iOS Data protection doesn’t protect email attachmentsBe aware, Apple iOS Data protection doesn’t protect email attachments

Be aware, Apple iOS Data protection doesn’t protect email attachments

Security Researcher Andreas Kurtz noticed that email attachments within different iOS versions are not protected by Apple's data protection mechanisms. Mobile…

11 years ago
Android vulnerability makes 99% of mobile devices attackableAndroid vulnerability makes 99% of mobile devices attackable

Android vulnerability makes 99% of mobile devices attackable

Bluebox Labs recently discovered an Android vulnerability in the OS's security model that allows hackers to attack 99% of Android…

12 years ago