A new threat known as WinPot malware is using a slot machine-like interface to empty ATMs at targeted financial institutions.
While most security professionals have come to embrace bring-your-own-device (BYOD) policies, leadership still often lacks confidence in the data security of employees' personal devices.
IT decision-makers need to fast-track the EMM selection process to stay ahead of the evolving threat landscape and more effectively manage Android devices.
A new phone-based phishing scam reveals how fraudsters are devising more sophisticated schemes to prey on Apple device users.
Researchers at Malwarebytes observed two instances of pre-installed malware targeting critical applications on Android devices.
As BYOD practices blur the boundary of the enterprise perimeter, how can security leaders ensure corporate data is safe?
Researchers spotted a new set of fake voice apps in the Google Play Store and suggested that the activity may signal the beginning of a new mobile botnet.
By embracing the dervied credentials approach to personal identity verification, companies can deliver strong authentication, scalability, adherence to NIST guidelines, and ease of use and deployment.
These days, many electronics companies deploy industrial IoT technologies without evaluating or protecting against cybersecurity risks, or preparing a fast and effective response to a breach.
With many organizations now dependent on iOS devices, security leaders must balance productivity and security with the right endpoint management solution.