For years, the statistics have told us that human error is the greatest contributor to cyberattacks. We’ve stressed the importance of training, training and more training to prevent the almost…
Browsing CategoryMobile Malware
Is Juice Jacking a Legitimate Threat or Nothing to Worry About?
Here’s another risk to add to the many issues that business travelers and their organizations must address: juice jacking — a type of cyberattack that involves malicious wall chargers or…
Clone or Swap? SIM Card Vulnerabilities to Reckon With
The most commonly used computer platform nowadays is no longer a desktop or a laptop — it’s a phone. According to Bank My Cell, as of August 2019, there are…
Adware Posing as 85 Photography and Gaming Apps on Google Play Installed Over 8 Million Times
The mobile platform is ubiquitous — enabling users to make online transactions, run their everyday lives, or even use it in the workplace. It’s no surprise that fraudsters and cybercriminals…
Mobile Device Management Evolves to Support New Device Use Cases
Mobile device management (MDM) technology has matured and is widely adopted across the enterprise. MDM now serves as a baseline management tool for organizations, supporting workers using smartphones, tablets and…
5G Will Change How We Manage Mobile Security — Here’s How to Start Preparing
Every once in a while, a new technology is unleashed that changes our lives. The wheel, the steam engine and the internet are just some examples that had a profound…
5G Will Change How We Manage Mobile Security — Here’s How to Start Preparing
Every once in a while, a new technology is unleashed that changes our lives. The wheel, the steam engine and the internet are just some examples that had a profound…
Preparing for the Unpredictable: Security in a New World of Mobile Malware
Mobile malware is nothing new. But in recent months, attackers have been getting more creative and resourceful with how they conceal, distribute and deploy these threats. This newfound creativity is…
Stay on Top of Zero-Day Malware Attacks With Smart Mobile Threat Defense
The mobile threat landscape is a dynamic ecosystem in perpetual motion. Cybercriminals are constantly renewing their attack techniques to access valuable data, challenging the capabilities of traditional mobile security solutions.…
Advanced Mobile Malware Attack Against iPhones in India using MDM System Control
Advanced mobile malware campaign targeted against 13 iPhone users in India and the attacker using an open-source mobile device management (MDM) system to control the compromised devices. It was unclear…