Tag "iOS"

Back to homepage
Software

Protecting iOS and Android applications in a fully automated way

In this Help Net Security podcast recorded at Black Hat USA 2019, Dave Belt, Technology Evangelist at Irdeto, and Jaco du Plooy, VP Cloakware at Irdeto, discuss the current threat landscape,

Mobile

High-Risk Vulnerabilities in iOS, Android Apps

The vast majority of mobile apps store data insecurely, according to Positive Technologies researchers who discovered high-risk security vulnerabilities in 38% of iOS apps and 43% of Android apps. “But

Mobile Software

Malvertising in Apple Pay Targets iPhone Users

The Media Trust has discovered a recent malvertising campaign involving Apple Pay that is part of a large-scale phishing and redirect campaign targeting iPhone users visiting premium newspapers and magazines.

Mobile

Why You Shouldn’t Put Your Faith In ‘Trusted’ Devices

In recent years, the mobile workforce has grown rapidly. Many forward-thinking companies have recognized the benefits of remote work and have adapted accordingly. However, allowing anywhere, anytime access to corporate

Hardware/Network Mobile

The future of smartphone security: Hardware isolation

Mobile spyware has become increasingly more ubiquitous in corporate networks and devices. In a 2017 study, Check Point has found that out of the 850 organizations that they queried, 100%

Hardware/Network

Coprocessor Attacks: the Hidden Threat

Botnets, DDoS and ransomware attacks, vulnerabilities in Internet of Things devices and Open Source Software, and the generally poor state of information security, dominate the discussion of cybersecurity. These same

Mobile

Developing Threats in Mobile Phishing

Click here to view original webpage at www.telemessage.com

Mobile

Apps most frequently blacklisted by enterprise security teams

Appthority released its Enterprise Mobile Security Pulse Report for Q4 2017, which details the apps most frequently blacklisted by enterprise mobility and security teams.For iOS devices, popular dating app Tinder

Hardware/Network

20 Million Google Home and Amazon Echo devces are affected by Millions of AI-based voice-activated personal assistants, including Google Home and Amazon Echo, are affected by the Blueborne flawsSecurity Affairs

A series of recently disclosed critical Bluetooth flaws that affect billions of Android, iOS, Windows and Linux devices have now been discovered in Millions of AI-based voice-activated personal assistants, including Google Home and Amazon Echo,

Mobile

Top blacklisted Android and iOS apps by enterprises

Enterprises blacklist apps for a range of security concerns, including specific malicious or data leakage behaviors, security policy compliance and concerns about shadow data storage. Appthority revealed the most frequently