Security Experts:

long dotted


Key security elements of the iPhone X include ditching the Home key and fingerprint access for facial access, and a new requirement for a passcode to be entered before the iPhone can be connected to an external device. [Read More]
Billions of devices may be exposed to a new and stealthy Bluetooth attack that can be carried out without any user interaction [Read More]
Samsung is offering bug bounties of up to $200,000 for Critical vulnerabilities in Samsung mobile devices and associated software through its Samsung Mobile Security Rewards Program. [Read More]
A total of 81 security vulnerabilities have been addressed in this month’s set of security patches for the Android platform. 13 of the flaws were rated Critical severity. [Read More]
A variant of the WireX Android botnet is able to deliver high-volume UDP Flood DDoS attacks, with a single bot capable of generating over 250GB of attack traffic per attack directive. [Read More]
A team of security researchers has discovered a series of code execution and denial of service vulnerabilities in the bootloaders of popular mobile platforms. [Read More]
The xRAT mobile remote access Trojan (RAT) includes extensive data collection capabilities and is associated with known mobile and Windows-targeting threats. [Read More]
Trend Micro will offer over $500,000 in cash prizes at Zero Day Initiative’s Mobile Pwn2Own contest set to take place Nov. 1-2, during the PacSec 2017 Conference in Tokyo, Japan. [Read More]
A recently spotted Android banking Trojan targeting South Korean users via SMS phishing messages (smishing) was linked to an infection campaign from two years ago, McAfee says. [Read More]
PoC released for recently patched iOS kernel vulnerabilities that can be chained to take full control of a device. Exploit also good for jailbreaks [Read More]

FEATURES, INSIGHTS // Mobile Security

rss icon

Scott Simkin's picture
Users, networks and applications can – and should— exist everywhere, which puts new burdens on security teams to protect them in the same way as the traditional perimeter.
Alastair Paterson's picture
By understanding what’s up with your mobile apps, you can mitigate the digital risk to your organization, employees and customers.
Adam Ely's picture
In this day of BYOD devices and zero-trust operating environments, IT and security professionals gain nothing from trying to manage the unmanageable—which is just as well, because the device is no longer the endpoint that matters.
Simon Crosby's picture
While flexibility offers countless benefits for corporations and their employees, this new emphasis on mobility has also introduced a new set of risks, and this in turn re-ignites a focus on endpoint security.
Adam Ely's picture
Applying a zero trust model to mobile and the right security controls at the app level could align productivity and security. But the bottom line is that it’s no longer about the device; it’s about the applications.
David Holmes's picture
DDoS continues to wax and wane in unpredictable cycles, but the ecosystem has evolved to keep it out of the mobile space.
Adam Ely's picture
The mobile strategist will play a pivotal role in mobile integration, as they pave the way for the organizations to do so purposefully and securely.
David Holmes's picture
After the rounds of predictions for 2014, I had bet my colleague that if no mobile DDoS appeared this year, we’d stop talking about it. And it looks like we can.
Adam Ely's picture
While mobile security remains at the top of every CISO’s priority list this year, enterprises have quickly begun to realize that mobile device management (MDM) and enterprise mobility management (EMM) are not enough to keep data safe.
Adam Ely's picture
From what to support to how to ensure the security of mobile apps and data, enterprises are banging their heads against the wall to find a solution to secure mobile.