You searched for mobile device management/ | Page 3 of 14 | SC Media

Your search for mobile device management/ returned 135 results

Your search for mobile device management/ returned 135 results

Sort Results:

Relevant Recent
Cybercrime, Malware, Mobile Security, Phishing, Security News

Spyware disguised as Spanish banking apps removed from Google Play

A spyware program fraudulently disguised as a Spanish-language banking app was found last month collecting users’ device data and messages, which were later leveraged in smishing schemes. Advertised as “Movil Secure,” the fake app pretends to be associated with multinational Spanish banking group Banco Bilbao Vizcaya Argentaria (BBVA). Published on Oct. 19, the app was discovered by Trend…
Cybercrime, Malware, Security News

Assault and battery: Malvertising campaign checks user devices’ charge as anti-detection technique

A mobile malvertising campaign recently found targeting three digital advertising platforms has been using malware that checks a phone’s battery level as part of an unusual new technique for avoiding detection. In just the last three weeks, the operation has fraudulently generated millions of page views, as the malware redirects certain victims to an unspecified malicious…
Corporate News, Security News

Sophos brings on DarkBytes

Sophos has acquired the endpoint security company DarkBytes. The companies did not release the financial details of the agreement, but Sophos said it plans to use DarkBytes technology as the foundation for new managed detection and response andSecurity Orchestration Automation Response services it plans to offer. “The strength and architecture of the DarkBytes platform will accelerate…
Reboot Leadership Awards 2019

Dani Martínez – IOActive

Why nominated: Dani Martínez proved to be a self-starter. Beginning his career in IT, he soon developed an interest in cybersecurity and began taking online courses in his spare time. Martínez dove right in and began a cybersecurity blog where he not only showcased his work, but was able to display his hacking skills. This…
Federal appeals court says police must get warrants for wireless location data
Security News

Report: Wireless geolocation data being resold to unauthorized parties

U.S. mobile carriers T-Mobile, Sprint and AT&T have been sharing customers’ geolocation information with third-party partners, who go on to sell that data to additional companies until it winds up in the hands of unauthorized individuals. Citing anonymous sources, a new exposé from Motherboard focuses heavily on the credit reporting company MicroBilt, which is known to purchase carrier…
Cybercrime, Ransomware, Security News, Website/Web Server Security

Avon attackers may have exploited unprotected web server

An openly accessible web server has emerged as a possible attack vector used by cybercriminals in a reported ransomware incident that affected personal care and beauty marketer Avon Products last June. Researchers from Safety Detectives today announced its discovery of a U.S.-based Avon.com server that was not defended by a password, leaving it accessible to…
Data Breach, Security News

2020 Predictions: Data Breaches

Experian predictionsCybercriminals will leverage text-based “smishing” identity theft techniques to target consumers participating in online communities. As more Americans continue to join like-minded groups on social media to provide financial support to social causes or political candidates, cybercriminals can solicit unsuspecting consumers with fraudulent messages via SMS text to seek bank account details or other…
Executive Insight, Opinions

Tackling the security complexity in 5G IoT devices

By Yogendra Shah, Senior Principal Engineer, InterDigital IoT is one of three major use cases driving the development of 5G and it brings untold complexity and inherent risk that threatens to undermine the opportunity even before it gets started. 5G networks are expected to connect tens of billions of IoT devices, and, as opposed to…
Product Review

BlackBerry Spark

BlackBerry Spark operates as an endpoint-centric and prevention-focused security suite. It offers a range of security capabilities and visibility to protect people, devices, networks, and apps, while its AI-backed malware and threat detection stops malicious processes before they execute. The BlackBerry Spark suite consists of three modules: BlackBerry Protect, BlackBerry Protect for Mobile, and Blackberry…
Next hm-product-review in Reviews