A Fresh Look at Malware and Mobile Threat Prevention

Mobile threat prevention enables organizations to proactively protect their devices, users, apps and data from malicious actors.

The post A Fresh Look at Malware and Mobile Threat Prevention appeared first on Security Intelligence.

Continue reading A Fresh Look at Malware and Mobile Threat Prevention

Google Play Bounty Promises $1,000 Rewards for Flaws in Popular Apps

Google announced a public bug bounty for Google Play that brings developers and researchers together to find and patch flaws in popular apps. Continue reading Google Play Bounty Promises $1,000 Rewards for Flaws in Popular Apps

Mobile Stock Trading App Providers Unresponsive to Glaring Vulnerabilities

IOActive analyzed 21 mobile stock trading platforms and found vulnerabilities that put transactions and personal information at risk. Of the 13 firms notified, only two acknowledged the disclosure. Continue reading Mobile Stock Trading App Providers Unresponsive to Glaring Vulnerabilities

O Me, O My! Android O and Its Impact on the Enterprise

Google’s Android O version 8.0 features a safe browsing API and other functions to improve mobile application security in the enterprise.

The post O Me, O My! Android O and Its Impact on the Enterprise appeared first on Security Intelligence.

Continue reading O Me, O My! Android O and Its Impact on the Enterprise

Google Changes How it Analyzes Misbehaving Mobile Apps

Google has a new machine-learning algorithm it uses to compare new apps to known secure apps, improving the way it classifies submissions to Google Play. Continue reading Google Changes How it Analyzes Misbehaving Mobile Apps

More Mobile Apps Means More Man-in-the-Middle Attacks

Mobile devices that contain unsanctioned apps are particularly vulnerable to man-in-the-middle attacks, especially when connected to unsecured Wi-Fi.

The post More Mobile Apps Means More Man-in-the-Middle Attacks appeared first on Security Intelligence.

Continue reading More Mobile Apps Means More Man-in-the-Middle Attacks

Learn to Love Online Dating Security

IT leaders must educate employees about online dating security to minimize the risks associated with the use of these services in the workplace.

The post Learn to Love Online Dating Security appeared first on Security Intelligence.

Continue reading Learn to Love Online Dating Security

The Risk From Mobile Malware Is Real — and Growing

The threat of mobile malware is real, so enterprises must provide security for both corporate applications and managed mobile devices.

The post The Risk From Mobile Malware Is Real — and Growing appeared first on Security Intelligence.

Continue reading The Risk From Mobile Malware Is Real — and Growing