Items Tagged with "Mobile Devices"


69dafe8b58066478aea48f3d0f384820

The Jester Posts PGP Data File from Webkit Exploit Op

March 12, 2012 Added by:Headlines

The Jester posted a link to data exfiltrated during last week's Webkit exploit aimed at mobile device users who scanned the QR-code posted as an avatar on his Twitter account and then were cross-referenced with a database of targeted jihadi and Anonymous operatives...

Comments  (2)

F29746c6cb299c1755e4087e6126a816

Twelve Security Best Practices for USB Drives

March 06, 2012 Added by:Kelly Colgan

Portable and mobile storage devices are significant players in most corporate offices. Ensuring proper protection with a best practices policy and strict enforcement offers significant risk reduction—and can prevent long nights on data breach investigations...

Comments  (1)

E313765e3bec84b2852c1c758f7244b6

Apple’s PC Free Feature: Insecure, But Maybe That’s Good

March 02, 2012 Added by:Brent Huston

During the WWDC keynote, Brent Huston spent considerable time discussing the lack of built-in security for the iOS. Each unique identifier on numerous devices would allow possibly unwanted users to see information they shouldn’t see. In some cases, not such a bad idea...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Do You Have A False Sense of Security for Mobile?

March 02, 2012 Added by:Robert Siciliano

With unit sales of smartphones and tablets eclipsing those of desktop and laptop PCs, cybercriminals will continue setting their sights on mobile, and increased mobile Internet use will continue exacerbating security and data breach issues. Protect yourself...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Targeting of Android Devices Leads Malware Trends for 2012

February 24, 2012 Added by:Headlines

"Smartphones and tablets are finally delivering consumers with these converged and connected experiences we've been promised for so long. But this is a double edged sword: as smart device usage becomes more sophisticated, so too are cyber criminals' methods of attacking..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

McAfee Report: No Immunity from Targeted Attacks

February 22, 2012 Added by:Headlines

“The threat landscape continued to evolve in 2011, and we saw a significant shift in motivation for cyber attacks. Increasingly, we’ve seen that no organization, platform or device is immune to the increasingly sophisticated and targeted threats..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Researchers Demonstrate Cell Phone Tracking Vulnerability

February 20, 2012 Added by:Headlines

Researchers at the University of Minnesota’s College of Science and Engineering have revealed a technique that could allow an unauthorized third-party to track the location of a cell phone using data available from cellular networks...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Seventy-Five Million Unique Malware Samples in 2012

February 08, 2012 Added by:Robert Siciliano

Imagine your body being targeted by 75 million viruses. That is exactly what’s happening to your digital devices. Laptops, desktops, netbooks, notebooks, Macs, iPads, iPhones, BlackBerrys, Androids, and Symbian mobile phones are all being targeted...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Secret Service Hits $250 Million Cell Phone Cloning Ring

February 07, 2012 Added by:Headlines

U.S. Secret Service’s New York Field Office recently investigated a sophisticated operation in which information from the cell phone accounts of tens of thousands of people is stolen to support a black market in international calling...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec Identifies Polymorphic Android App Malware

February 06, 2012 Added by:Headlines

Researchers at Symantec have identified a crafty Trojan targeting Android devices which slightly modifies its code every time the malware is downloaded, a called server-side polymorphism, which makes it more difficult to detect by signature-based antivirus software defenses...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Which Will Make a Bigger Splash in 2012 - Mobile Wallet or EMV?

February 01, 2012 Added by:Robert Siciliano

Visa has announced plans to accelerate the migration to EMV contact and contactless chip technology in the United States. The company intends to encourage investments in infrastructure necessary to accept and process both new forms of payment technology...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Tech Continues to Bedevil Infosec and Privacy Practitioners

January 30, 2012 Added by:Rebecca Herold

Organizations need to get off the stick, do risk assessment to determine the extent of personal computing device use within their organizations and then update their policies, create new procedures, and implement new technologies accordingly...

Comments  (0)

37d5f81e2277051bc17116221040d51c

2012 Threats: Are You Ready?

January 30, 2012 Added by:Robert Siciliano

Attackers from all over the world have set their focus on critical life supporting utilities such as water and power to hold those utilities hostage for payment or to disable them to cause terror. Unfortunately, many industrial and national infrastructure networks are vulnerable...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Mobile Application Security: New Platforms, Old Mistakes

January 24, 2012 Added by:Fergal Glynn

While Android may be a new platform, some of the security issues we found are reminiscent of old mistakes we have seen developers make. One example of this was the practice of hard-coding cryptographic keys directly into the application...

Comments  (0)

4e21f96122846f32545687ad42b271e2

Windows Phone Application Analyzer v1.0 Released

January 20, 2012 Added by:Security Ninja

I developed and would like to introduce the Windows Phone App Analyzer, The Windows Phone App Analyser is similar to the static analysis tab in Agnitio. If you browse to any C# .cs files and click scan you will see the keyword highlighting that you might be familiar with from Agnitio...

Comments  (0)

1a490136c27502563c62267354024cd5

That a Phone in Your Pocket or Are You Scanning My Network?

January 16, 2012 Added by:Malgorzata Skora

Smartphones have become much more powerful over the past few years. Combine this power with the right applications and you can scan a network from the inside in seconds, along with performing several other new types of attacks for information gathering...

Comments  (1)

Page « < 5 - 6 - 7 - 8 - 9 > »