Please turn on your JavaScript for this page to function normally.
Mobile security breaches impacted 68% of organizations

Mobile security breaches have affected 68 percent of organizations in the last 12 months, according to a new global study from BT. Despite this, organizations are still not …

Extracting data from air-gapped computers via mobile phones

A group of researchers from the Department of Information Systems Engineering at Ben-Gurion University in Israel have demonstrated and detailed a technique that can allow …

Over one-third of all enterprise data leakage policy violations occur on mobile devices

Nearly half of all cloud app activities and more than one-third of all data leakage policy violations occur on mobile devices, say the results of the October 2014 Netskope …

Samsung users could be locked out of their devices by attackers

A zero-day flaw in Samsung’s Find My Mobile system that can be extremely easily exploited to remotely lock a target’s phone has been uncovered by programmer and …

40% of enterprise employees use personal devices for work

Approximately 40 percent of U.S. consumers who work for large enterprises said they use their personally owned smartphone, desktop or laptop daily for some form of work …

What all major brands share in common with the Snappening

By now we have all heard about “The Snappening”—hyped as a high-profile data breach involving the photo-sharing application Snapchat. Virtually every news outlet …

Detecting cyber attacks in a mobile and BYOD organization

Mobile devices – laptops, tablets and smartphones – have been part of the information technology culture for some time. Enabling employees and contractors to bring …

Leaked Snapchat images came from third-party server

Snapchat is a mobile photo messaging app that allows users to send pictures that “self-destruct” a few moments after being viewed, and is especially popular with …

Education is the key to increasing mobile security

The swathes of high-profile security breaches in recent months have only served to highlight the need to educate the public on the inadequacies of the security systems …

Kali NetHunter turns Nexus devices into portable hacking tools

Offensive Security, the security training company behind Kali Linux, the popular Debian-based OS designed for digital forensics and penetration testing, and Kali community …

Companies becoming lax in managing BYOD risk

Exposure to risk is as much of a threat today as it was in 2013; however, organizations have become less diligent in BYOD management and mitigation, according to TEKsystems. …

Minimizing privacy risks of location data collection

With the advent of smartphones and tablets – devices users often carry with them everywhere they go – collected location data became a valuable source of …

Don't miss

Cybersecurity news