Tag "Mobile Device"

Back to homepage
Hardware/Network Software

The perimeter is vanishing, how will you secure your network?

There’s a new reality to network security, driven by the fact that the perimeter is vanishing. The concept of a network being fully enclosed within a building or virtual organization,

Industry Insights

The 3 Biggest Threats Healthcare Data Security is Facing Right Now

The year 2017 suffered the greatest ransomware attack in the history of the internet. The WannaCry ransomware detected in hospitals of the UK. It then exploded across the globe and affected

Identity Theft Mobile

One in three organizations suffered data breaches due to mobile devices

New Verizon report shows a big gap between organizations’ mobile security risk concerns and mobile security best practices they implement. The number of security incidents involving mobile devices has increased

Identity Theft Mobile

One in three organizations suffered data breaches due to mobile devices

New Verizon report shows a big gap between organizations’ mobile security risk concerns and mobile security best practices they implement. The number of security incidents involving mobile devices has increased

Software

Formjacking is the new get rich quick scheme for cybercriminals

Faced with diminishing returns from ransomware and cryptojacking, cybercriminals are doubling down on alternative methods, such as formjacking, to make money according to Symantec’s Internet Security Threat Report (ISTR), Volume

Software

Cybercriminals leverage Google Translate to hide their phishing sites

Attackers are using a new technique that uses Google Translate to hide the real domain of their phishing sites. This phishing technique works more effectively in mobile devices when compared

Mobile

Android Malware Steals from PayPal Accounts

What happens when you combine a remotely controlled banking Trojan with an abuse of Android Accessibility services? According to new research from ESET, you get an Android Trojan that steals money from

Mobile

The greatest mobile security threats facing enterprises

To diminish threats on unsecured networks, enterprises can take the following action. As mobile device access for workers has increased, so have the potential security threats. All it takes is

Hardware/Network

Overcoming the Electronics Industry’s Insecurity Over Industrial IoT Deployments

In December 2017, cyberattackers used TRITON/TRISIS malware to target safety instrumented system (SIS) controllers at a critical infrastructure organization. The malware was designed specifically to interact with the controllers, potentially

Identity Theft Software

Phished credentials caused twice as many breaches than malware in the past year

Personal device use for remote work poses the biggest security risk to organisations safeguarding their increasingly mobile and cloud-based IT environment, according to a new survey of 100 UK-based senior