You searched for android | SC Media

Your search for android returned 32 results

Your search for android returned 32 results

Sort Results:

Relevant Recent
Executive Insight

Does Cybersecurity Automation Offer More Hype than Hope for Battling Hackers?

Artificial intelligence and machine learning are the rage in tech right now and not surprisingly, many cyber companies are beginning to automate an increasing amount of their operations. Some of this is great, particularly when it assists cybersecurity professionals to automate mundane tasks and focus more of their attention on higher level analysis. But so…
Executive Insight

Mobile Malware Risk: Why Prevention is Better than Cure, and What You Can Do About It

It’s getting to the point where we need to add malware to the list of life’s certainties, along with death and taxes. The WannaCry outbreak saw the ransomware spread to more than 200,000 hosts in over 150 countries worldwide, according to Europol, the EU’s law enforcement agency. The risk of infection from malicious software is growing all the…
Executive Insight

Future-proofing Comes of Age in IT Security

None of us has a crystal ball, but we can put measures in place to move forward with confidence, taking advantage of new opportunities and addressing new challenges as they emerge. I’m referring to the business imperative of “future-proofing” in our hyper pace of change and disruption. Automobiles are now including Apple’s CarPlay and Google’s…
Executive Insight

Unsupervised anomaly detection giving security pros a leg-up on bad online actors

Cybersecurity attackers in 2017 have it easy. Powerful tools for abusing online services are easy to find online for free. Compromised Android devices provide attackers with a vast reservoir of high-reputation IP addresses for hackers to exploit.  A more privacy-conscious public is leveraging privacy-protecting devices and browsers and IP-masking services that can hide an original…
Executive Insight

WikiLeaks, the CIA and Your Phone

WikiLeaks is an organization that has made a name for itself by leaking classified government documents relating to national security, warfare, surveillance programs, and government corruption.  WikiLeaks has leaked millions of documents, many of which were designated secret or top secret. Conspicuously absent from WikiLeaks’ efforts are leaks related to Russia or China. However, back…
Limor Kessem
Executive Insight

IoT App Status: Insecure

In my last post about IoT security, we discussed how lax consumer attitudes about securing devices and wearables could be a contributing factor to their insecurity. In this post, we will examine another angle: securing IoT devices on the application level. This time we’ll go straight to the source and look at what enterprise users…
Limor Kessem
Executive Insight

Big Malware Moments of 2016 Part 2

To check out the first half of Limor Kessem's 2016 malware retrospective click here: Big Malware Moments of 2016 Part 1
Next post in Security News