Cloud apps and mobile devices are screaming their way into the enterprise like jet fighters, bringing employees more access than ever - and more passwords as well.
Software developers are challenged with prioritizing between delivering code within aggressive timelines and incorporating security into the development lifecycle.
Hillary Clinton used a private email account during her tenure as secretary of state.
The worm has gained traction through spam text messages that promise users an Amazon giftcard.
The official Android app of the event contains some flaws that could allow spammers to easily scrape data belonging to conference attendees.
On the heels of naming a new president and CEO, Silent Circle now assumes 100 percent ownership of Blackphone.
Like virtually all online threats, malware is increasingly finding a ripe new territory on the mobile platform, reports Karen Epper Hoffman.
Intrusions detected in 2010 and 2011 may be related to surveillance efforts revealed in Snowden leaks, the company said.
Aside from the many benefits native apps provide, enterprises face challenges they need to deal with to make sure they aren't exposed to the new security risks native apps introduce.
Mobile cyber threats are on the rise and getting more advanced. Enterprises want to bolster their security programs to protect against new, unknown mobile threats, but understanding these risks requires visibility.
The American Civil Liberties Union (ACLU) has released documents obtained from Florida police and sheriff's departments that reveal Stingray use and raise privacy concerns.
The SIM card maker said it will "devote all resources necessary" to investigate hacking claims revealed in Snowden leaks.
Masque Attack II entails bypassing an iOS prompt for trust and app URL scheme hijacking, FireEye said.
A study by Lacoon and Check Point found 18 different variants of mRATs with Androids more likely to be infected.
It's too late to put the kibosh on mobile computing in the enterprise. And why would any organization want to? The benefits are clear.
Findings from IBM serve as a reminder this Valentine's Day to boost mobile security efforts, even when dealing with apps from so-called "trusted" marketplaces.
In this video, Michael Shaulov, founder and CEO of Lacoon Mobile Security, discusses how the exploit works, what attackers can do with it, and what organizations should do to protect users from these types of mobile threats.
Between January 2013 and December 2014, cell phone robberies dropped 16 percent in New York and 27 percent in San Francisco.
In some instances, it took 30 days for the newly-installed apps to display "abnormal" behavior.
The increasing prevalence of mobile applications is exposing new security holes for businesses.
A new report from the Federal Trade Commission (FTC) provides data security steps for businesses and promotes data minimization.
The hotel chain has addressed a weakness in its Marriott International Android app that could have allowed attackers to access customer data, including credit card information.
The app is no longer available from the Google Play store, but prior to being removed it had been installed between 50,000 and 100,000 times.
Apps were flagged for containing malware or suspicious binaries, a RiskIQ study found.
Verizon has fixed a critical vulnerability in its My FiOS app that made it possible to read and send messages from any Verizon user's email account.
Mobile security company Lookout released its annual Mobile Threat Report on Thursday, which demonstrated a major uptick in Android malware encounters.
Manhattan District Attorney Cyrus Vance said in a speech earlier this week that he thinks device-makers should be required to give law enforcement access to their users' data.
SnoopSnitch requires a rooted device with a Qualcomm chipset that runs stock Android 4.1 or higher.
On Thursday, Netskope released a report analyzing risky app usage in enterprise environments.
Two senators wrote a letter requesting more information about stingray use and the FBI's policies surrounding the devices.
Sign up to our newsletters
SC Magazine Articles
- New SSL/TLS vulnerability, FREAK, puts secure communications at risk
- Report: Majority of health-related websites leak data to third parties
- Researchers investigate link between Axiom spy group, Anthem breach
- Natural Grocers investigating unauthorized access to POS systems
- Spammers leverage DMARC to more successfully distribute ransomware
- Clinton's use of private email spawns security, transparency debate
- Android 'Gazon' worm proliferates through texts, infects more than 4k phones
- Ramirez: FTC focus on data security, fraud, cross device tracking
- Greenwald says Snowden invoked changes toward privacy
- Playing defense in ranks: Cybersecurity reimagined