Application Security January 31, 2019 Hey Siri, Get My Coffee, Hold the Malware 5 min read - According to IBM X-Force IRIS research, there are several security concerns that should be taken into consideration before using Siri Shortcuts.
December 3, 2018 FakeSpy And XLoader Mobile Malware May Come From Yanbian Gang 2 min read - Security researchers revealed that two mobile malware threats, Xloader and FakeSpy, may have been developed and launched by the same cybercriminal group.
October 30, 2018 Cybercriminals Distribute TimpDoor Malware to Turn Android Devices Into Network Proxies 2 min read - The TimpDoor malware family enables cybercriminals to turn infected Android devices into network proxies without users' knowledge.
Endpoint September 25, 2018 Which Mobile Threats Do You Need to Prepare For? 2 min read - As the workforce has embraced digital transformation, the volume and frequency of mobile threats has skyrocketed. Which threats should your organization be worried about?
August 1, 2018 Fake Android Banking Apps Leak Credit Card Details Online 2 min read - In July 2018, Researches reported three fake Android banking apps that phished for users' credit card details and leaked them online by transferring them to an exposed server.
August 1, 2018 Unknown Actor Leaks Android Malware Exobot Source Code 2 min read - An unknown threat actor leaked the source code for the Android malware Exobot, leading to fears of an impending attack similar to the massive DDoS incident that hit domain name provider Dyn in 2016.
Endpoint July 9, 2018 A Brief History of iOS: The Evolution of MDM and Enterprise Mobility 5 min read - As the mobile threat landscape has expanded over the past decade, Apple's iOS releases have added new MDM features to help security professionals protect enterprise networks.
June 27, 2018 How a 40-Year-Old Mobile Security Flaw Puts Consumers at Risk 3 min read - A decades-old mobile security flaw resurfaced in recent weeks after a U.S. senator reported that cybercriminals exploited the Signaling System 7 (SS7) protocol to breach a mobile carrier.
March 19, 2018 The New State of Cybersecurity: Bursts, Worms and Mobile Threats 2 min read - Cisco's "2018 Annual Cybersecurity Report" found that burst attacks, cryptoworms and mobile threats are among security professionals' top concerns in 2018.
March 7, 2018 Security Flaw Spawns 10 New Kinds of 4G LTE Attacks, Researchers Report 2 min read - A group of researchers discovered a flaw in the protocol used in telecommunications networks that could enable fraudsters to pursue at least 10 different types of 4G LTE attacks.