Choosing the right secure file transfer vendor in today's heightened security & compliance landscapeJune 17, 2015
As mobile technologies, cloud computing, and always-connected environments continue to enable fluid movement of data, organizations must consider solutions that meet both current, and future needs.
The NSA intercepted communications from hundreds of email accounts from major cell phone network operators to exploit network weaknesses for surveillance purposes.
Earlier this month, it was revealed that DOJ uses "dirtboxes" attached to aircrafts to spy on Americans' mobile devices.
Kristin Nyunt of Monterey, Calif., is charged with two counts of illegal wiretapping and possession of illegal interception devices and faces a sentence of up to five years in prison.
Just recently we witnessed the U.S. House of Representative pass two bills aimed at bolstering the security operations of the nation's critical infrastructure.
It's more than a trend. Mobile devices are becoming the new enterprise desktop. But mobile devices require the same security considerations to access corporate intranets or securely sending and receiving email.
On Monday, the University of New Haven revealed its first video in a series of security findings.
Trend Micro found that compromised hosts, DDoS attack services and remote access trojans were the most coveted offerings in the marketplace last year.
The third annual Mobile Pwn2Own competition will feature new devices to crack and a $425,000 prize pool, which has gone up $125,000 from last year's.
Starting July 2015, all smartphones sold in the state must come with the anti-theft technology.
BYOD improves employee satisfaction and productivity, but the fact remains that business risk increases dramatically when personal and business applications intermingle.
Anonymous confessions posted on a popular app, called "Secret," were susceptible to being exposed via a hack.
The Metropolitan Police have reportedly lobbied for two years to enact the standard.
The firm analyzed 1,000 free apps in Google Play which were most downloaded by users.
The vulnerability comes into play when Instagram users search for Facebook friends to "follow."
An Android RAT known as Krysanec, which can take photos, record audio and steal data, is being spread through modified legitimate apps.
The task force will examine the use of the technology by foreign intelligence agencies and criminals targeting Americans.
The mobile security vendor will use the funds to extend its security platform to the enterprises.
A group of security pros called "I am The Cavalry" introduced a five star automotive cyber safety program.
Two hackers demonstrated how device vulnerabilities could allow attackers to access sensitive card data using multiple attack vectors.
In this video shot at Black Hat 2014 in Las Vegas, Jeff Forristal of Bluebox Security sits with Danielle Walker, reporter at SC Magazine, to discuss the Fake ID Android vulnerability.
Users were lured by phishing emails, which supposedly contained a free Kaspersky mobile security app.
The use of social media spreads throughout the internet and cares little if the participants are Joe and Jane or the Massive Big Company. They're all swimming in the same pond and they all are susceptible to breaches that involve social media use. And how do most people use social media? Mobile devices.
The mobile malware is currently targeting German users, McAfee revealed.
On Tuesday it was announced that the phonemaker would purchase the voice and data encryption firm.
Two researchers wrote about the Instagram app for iOS and Android is vulnerable to session hijacking because both send unsecured information through HTTP.
In a study, HP Fortify tested 10 popular Internet of Things (IoT) devices, including TVs, webcams and device control hubs.
Researchers with Bluebox, who uncovered the vulnerability, dubbed it "Fake ID" because it enables the identity of trusted applications to be copied.
Rishab Verma and his company agreed to settle charges filed by the FTC that Verma sent millions of spam text messages that deceitfully promised free merchandise.
Android/Simplocker ransomware now encrypts archive files, asks to be installed as a Device Administrator, and delivers an English-language ransom message.
Sign up to our newsletters
SC Magazine Articles
- 'MEDJACK' tactic allows cyber criminals to enter healthcare networks undetected
- Samsung devices, including Galaxy S6, vulnerable to remote code execution
- Dridex banking malware spreading through new spam campaign
- U.S., China agree to cybersecurity code of conduct
- Suspicious activity on LastPass network, data compromised
- Former Georgia-Pacific sysadmin charged with damaging protected computers
- Harvard University announces network intrusion, possible data exposure
- Saboteurs leverage RIPv1 for DDoS reflection attacks
- More than 440K new Android malware strains found in Q1, study finds
- Apple releases OS X 10.10.4 and iOS 8.4, numerous bugs addressed