Endpoint December 28, 2016 Avoiding the Technology Upgrade? Don’t Dodge Security 4 min read - Consumers are buying new devices at a slow rate, but users who avoid the latest technology upgrade risk missing out on critical security updates.
December 22, 2016 Revised Mobile Banking Trojans Faketoken and Tordow 2.0 Threaten Customer Information and Business Integrity 2 min read - Banking Trojans already pose a huge threat to finance firms. Now, cybercriminals have added encryption capabilities to two existing ransomware campaigns.
December 19, 2016 Root of the Problem? Tordow Malware 2.0 Goes After Top Android Permissions 2 min read - Experts believe the new iteration of Tordow malware, which targets root access to take total control of infected devices, could become a worldwide threat.
December 6, 2016 Mobile Security News Roundup: Top Stories From November 2 min read - November's mobile security news roundup covers iCloud insecurity, holiday shopping hazards, Android issues involving plugin Trojans and ad fraud malware.
December 5, 2016 Wake-Up Call: Millions of Android Users at Risk of MitM Attacks 2 min read - Security researchers at Zimperium zLabs found a vulnerability in the AirDroid app that could enable a cybercriminals to execute MitM attacks.
December 5, 2016 A Software Attempt to Mitigate Rowhammer Attacks 2 min read - German researchers developed two methods for mitigating Rowhammer attacks, which exploit the physical hardware in dynamic random-access memory (DRAM).
November 9, 2016 Exaspy Spyware Is Available as a Service 2 min read - Exaspy spyware, which infects Android phones to intercept text messages, emails and other communications, is available as a commodity service online.
November 8, 2016 Mobile Security News Roundup: Top Stories From October 2 min read - October's mobile security news headlines covered startling statistics on public Wi-Fi use, mobile apps that leak location data and selfie authentication.
Endpoint October 24, 2016 GM Bot: Alive and Upgraded, Now on Android M 3 min read - Researchers discovered a new version of banking Trojan GM Bot that enables cybercriminals to bypass security features included with Android Lollipop.
October 20, 2016 Novel ASLR Bypass Depends on CPU Hardware 2 min read - Address space layout randomization (ASLR) is a widely-used method that prevents memory corruption attacks by arranging the address space positions of key data areas in a random manner. This technique can be found in the security designs of many applications…