mobile devices
Mobile security breaches impacted 68% of organizations
Mobile security breaches have affected 68 percent of organizations in the last 12 months, according to a new global study from BT. Despite this, organizations are still not …
Extracting data from air-gapped computers via mobile phones
A group of researchers from the Department of Information Systems Engineering at Ben-Gurion University in Israel have demonstrated and detailed a technique that can allow …
Over one-third of all enterprise data leakage policy violations occur on mobile devices
Nearly half of all cloud app activities and more than one-third of all data leakage policy violations occur on mobile devices, say the results of the October 2014 Netskope …
Samsung users could be locked out of their devices by attackers
A zero-day flaw in Samsung’s Find My Mobile system that can be extremely easily exploited to remotely lock a target’s phone has been uncovered by programmer and …
40% of enterprise employees use personal devices for work
Approximately 40 percent of U.S. consumers who work for large enterprises said they use their personally owned smartphone, desktop or laptop daily for some form of work …
What all major brands share in common with the Snappening
By now we have all heard about “The Snappening”—hyped as a high-profile data breach involving the photo-sharing application Snapchat. Virtually every news outlet …
Detecting cyber attacks in a mobile and BYOD organization
Mobile devices – laptops, tablets and smartphones – have been part of the information technology culture for some time. Enabling employees and contractors to bring …
Leaked Snapchat images came from third-party server
Snapchat is a mobile photo messaging app that allows users to send pictures that “self-destruct” a few moments after being viewed, and is especially popular with …
Education is the key to increasing mobile security
The swathes of high-profile security breaches in recent months have only served to highlight the need to educate the public on the inadequacies of the security systems …
Kali NetHunter turns Nexus devices into portable hacking tools
Offensive Security, the security training company behind Kali Linux, the popular Debian-based OS designed for digital forensics and penetration testing, and Kali community …
Companies becoming lax in managing BYOD risk
Exposure to risk is as much of a threat today as it was in 2013; however, organizations have become less diligent in BYOD management and mitigation, according to TEKsystems. …
Minimizing privacy risks of location data collection
With the advent of smartphones and tablets – devices users often carry with them everywhere they go – collected location data became a valuable source of …