Mobile Security | SC Media

Mobile Security

Sophos Mobile 9.0

The Sophos Mobile Device Management platform (which may shortly be rebranded as InterceptX for mobile) is a native endpoint security solution that integrates with third-party solutions to reduce time and effort spent on managing traditional and mobile endpoints without inhibiting productivity. We initially struggled to set up this site. Eventually, we had to open a…

VMWare Workspace ONE UEM 1907

VMWare Workspace ONE integrates access control and application and multi-platform endpoint management for any application on any device without sacrificing security or control. Employee productivity demands, such as flexible workstyles and device choice freedom, have dissolved the traditional security perimeter and the product reflects that with  unified endpoint management transforms businesses by creating a better…

iPhone's are also susceptible to hacking.

Federally funded Unimax smartphone pre-loaded with malware

The Unimax UMX U686CL is a Chinese-made smartphone distributed by the federally funded Assured Wireless by Virgin Mobile has been found to come pre-loaded with two malicious applications. Malwarebytes researchers found the malware every owner finds on their phone is Wireless Update and amazingly the device’s own Settings app, neither of which can be removed…

2020 Predictions: Technology

John Prisco, president & CEO, Quantum Xchange Prediction: Quantum computers will advance far quicker than predicted, leaving enterprises scrambling to become quantum safe. The first true use of quantum computing will be in nation-state cyberwar activity and not a commercial application. By the end of 2020 it will be evident that RSA 2048 will be…

2020 cybersecurity predictions

Curtis Simpson, CISO, Armis Voice Deepfakes will become the new phishing bait: C-level executives, politicians and other high-profile individuals are already high-risk targets for standard email phishing attacks given their level of access and financial decision making within their organization. With advancements in the deepfake voice technology, I expect a rise of voice phishing schemes…

Two information-disclosing bugs found in Twitter Android

In the span of five days, reports of two Twitter Android app vulnerabilities have surfaced: one that could cause attackers to view nonpublic account information or control accounts, and another that reportedly allowed a researcher to look up details on 17 million accounts. In a Dec. 20 blog post, Twitter noted that it issued an…

Over 100 apps found to serve unwanted ads using ‘Soraka’ SDK

More than 100 Android applications that were downloaded over 4.6 million times via the Google Play Store were found to contain malicious code that delivers unwanted, out-of-context (OOC) advertisements to users. The code, a software development kit called Soraka, typically delivers its first OOC ad just after a device is unlocked, according to a new…

2020 Predictions: Data Breaches

Experian predictionsCybercriminals will leverage text-based “smishing” identity theft techniques to target consumers participating in online communities. As more Americans continue to join like-minded groups on social media to provide financial support to social causes or political candidates, cybercriminals can solicit unsuspecting consumers with fraudulent messages via SMS text to seek bank account details or other…

Ring camera hacks show the need for better IoT security

Ring camera doorbells gained fame for catching porch pirates steal packages but after several high-profile cases where hackers gained control of them they are being held up by the cybersecurity industry as a prime example why companies and homeowners need to take IoT security seriously. The Ring cases revolve around malicious actors hijacking these devices…

Next post in IoT