Mobile Security | SC Media

Mobile Security

Google patches Bluetooth vulnerability impacting most Android devices

Google has issued a critical security update for Android that affects the Bluetooth functionality on about two-thirds of all Android devices now in use. The vulnerability, CVE-2020-0022, affects devices running Android Oreo (8.0 and 8.1) and Pie (9.0) and can allow remote code execution without any user interaction. The flaw was found and reported to…

Israel comes under cyber attack

Netanyahu’s Likud Party election app leaked personal info on Israel’s 6.4M voters

If the technology failure at the heart of the Iowa caucus debacle seemed bad, consider that an app used by Israeli Prime Minister Benjamin Netanyahu’s Likud Party just exposed personal data on more than 6.4 million Israelis – in other words, the entirety of the country’s voter database.  Likely at fault, according to a report…

Malicious apps now post their own positive reviews on Google Play

The assault on Google’s Play Store continues with 30 malicious apps being revealed that have been downloaded hundreds of millions of times and having capabilities that have caused security firms suggesting end users take extraordinary steps to vet software prior to downloading. VPNpro and Trend Micro made public 24 and four apps, respectively, that are…

Analysis of popular apps finds rampant sharing of personal data

An analysis of 10 highly popular Android apps found what researchers are calling the “out of control” sharing of potentially sensitive information with third parties, in some cases in likely violation of Europe’s GDPR privacy regulations. The findings, which were published in a report issued by the Norwegian Consumer Council (NCC), prompted a coalition of…

SC Labs’ Product Reviews: Mobile device management and unified endpoint management

Mobile device management is a crucial component of maintaining a stable security posture, but mobile device management and unified endpoint management tools, one of the more difficult areas of cybersecurity is one of the most difficult areas of cybersecurity. The everchanging and growing threat landscape makes security difficult enough, while the lack of control surrounding…

BlackBerry Unified Endpoint Management Q-Series

BlackBerry UEM monitors mobile devices via a single management console using a trusted end-to-end security model to reduce risks and meet regulatory compliance requirements without compromising productivity. BlackBerry has clearly prioritized security in this version, evident in the addition of iOS and Android patch management. BlackBerry Work is an application that provides secure access to…

Hexnode 8.2

Hexnode offers enterprise-wide endpoint management for both personal and corporate-owned devices, all on a single console. This product comes with a variety of customizations and top-of-the-line support. Hexnode is sleek and, overall, well organized. The dashboard layout shows a high-level overview of device and user information. Unfortunately, it has no widget configuration capability that would…

IBM MaaS360 with Watson 10.74

IBM MaaS360 with Watson is a robust, multi-tenant and cloud-based endpoint management solution that supports mobile and desktop platforms to give advanced compliance, security monitoring and policy enforcement. It also features may third-party integrations, making it lightweight and frictionless. Watson, a question-and-answer system backed by machine learning technology, provides information retrieval, automated reasoning and knowledge…

Meraki Systems Manager SaaS

Meraki Systems Manager offers simple, immediate and centralized endpoint device management. The beauty of this product is the simplicity. It is up and running within minutes and performs the basic functions necessary to manage and secure all network devices. It is also easily scalable, making it a viable option for organizations of any size. From…

MobileIron UEM R64

MobileIron UEM secures modern device platforms with zero sign-on, multi-factor authentication (MFA) and mobile threat detection. The product aggregates device and application information in a single pane of glass for easy provisioning, configuration and management across the entire deployment lifecycle. MobileIron UEM always verifies devices, applications, users and networks. This “never trust, always verify” approach…

Next hm-product-review in Reviews