Endpoint August 25, 2017 Personal Electronic Devices Dodge TSA Ban — For Now 2 min read - To the chagrin of enterprise security experts, the TSA recently decided against a proposed ban on packing personal electronic devices in carry-on luggage.
August 3, 2017 Triada Trojan Creates Fresh Security Headache for Android Users 2 min read - The Triada Trojan has been found in the firmware of various Android devices. The malware can run cyber espionage modules and steal sensitive data.
June 29, 2017 Svpeng Stings Users With Threefold Boost to Mobile Ransomware 2 min read - Kaspersky Lab has reported that mobile ransomware infections are on the rise to booming strains of the Svpeng malware family.
Network June 27, 2017 Execute Your IoT Deployment by the Book 2 min read - More connected devices means a larger threat surface. That's why it's critical to prioritize security when designing your IoT deployment.
Endpoint June 26, 2017 Should We Disconnect to Improve IoT Security? 3 min read - There is no such thing as total IoT security, and the value businesses can gain from the technology outweighs the perceived benefit of disconnecting.
June 12, 2017 New Android Cleaning App Pulls Dirty Tricks to Grab Admin Rights 2 min read - A new Android app that claims to clean a device actually grabs admin rights to carry out malicious actions — and proves almost impossible to scrub out.
Intelligence & Analytics June 8, 2017 Securing Your Enterprise Assets While Traveling for Work 3 min read - It is critical to ensure that the right policies and controls are in place to help defend enterprise assets before a business trip, on the go and at home.
Endpoint June 5, 2017 Four Key Considerations for Managing Your IoT Population 3 min read - To effectively manage your IoT population, you must understand where your devices are, what they do, who is using them and how they connect to the network.
May 31, 2017 Cloak-and-Dagger Attack Creates Android Device Takeover Risk 2 min read - Your Android device could be at risk from a new class of attack that allows for full takeover of a smartphone with valid permissions.
May 26, 2017 Survey: IT Leaders Concerned About Mobile Workforce Security Challenges 2 min read - A survey revealed that IT leaders are struggling to strike a healthy balance between the benefits and security risks associated with a mobile workforce.