Consumers neglecting mobile security despite growing number of threats

Over the past year, consumers have adapted to many changes, including the rapid shift towards a digital-first lifestyle. This has led to an emphasis on consumers dependence on mobile devices, as they look to execute nearly all daily activities via devi… Continue reading Consumers neglecting mobile security despite growing number of threats

76% of IT decision makers more vulnerable to mobile attacks than just a year ago

53 percent of IT decision makers admitted that it’s not possible to be prepared for all the tactics and strategies used by attackers targeting mobile devices, a survey by Sapio Research reveals. Going one step further, 38 percent claimed that it’s impo… Continue reading 76% of IT decision makers more vulnerable to mobile attacks than just a year ago

Microsoft Defender for Endpoint now detects jailbroken iOS devices

Microsoft has announced new and improved capabilities for enterprise security teams that use Microsoft Defender for Endpoint on Android and iOS and Microsoft threat and vulnerability management APIs. Mobile device protection Microsoft Defender for Endp… Continue reading Microsoft Defender for Endpoint now detects jailbroken iOS devices

Organizations have seen an increase in device encryption

32% of organizations have seen an increase in device encryption in the past year, according to a Vanson Bourne survey. Additionally, 31 percent noted that their organization now requires all data to be encrypted as standard, whether it’s at rest or in … Continue reading Organizations have seen an increase in device encryption

Mobile stalkerware is on the rise

Mobile stalkerware, which is software silently installed by stalkers onto victims’ mobile devices without their knowledge, is on the rise, an ESET research finds. In 2019, ESET telemetry recorded almost five times more Android stalkerware detections th… Continue reading Mobile stalkerware is on the rise

Private LTE or 5G: Which Is More Secure?

Employees using mobile devices for work is nothing new. From health care workers using them for patient care to a salesperson checking work email in an airport, most of us have our phones on us at all times. However, the increase in the number of remote workers due to the COVID-19 pandemic has ramped up […]

The post Private LTE or 5G: Which Is More Secure? appeared first on Security Intelligence.

Continue reading Private LTE or 5G: Which Is More Secure?

Have You Been Smished? Mass Smishing Operation Targeting Mobile Users with Fake Amazon and USPS Update Messages

Summary
Earlier this month, mobile users began being targeted with smishing messages in what appears to be an organized spam operation campaign. Smishing is much like phishing, except rather than sending email, the attackers send text messages usi… Continue reading Have You Been Smished? Mass Smishing Operation Targeting Mobile Users with Fake Amazon and USPS Update Messages

16% of mobile devices in developing markets now infected with malware

Mobile users already disadvantaged by an economic and digital divide have suffered the most from digital fraud throughout the COVID-19 pandemic. In emerging markets such as Brazil, Indonesia, South Africa and Thailand, 16 percent of mobile devices that… Continue reading 16% of mobile devices in developing markets now infected with malware

Most users don’t know the capabilities and risks of QR codes

QR code usage continues to rise in popularity. In fact, 57% of respondents to a new Ivanti study claim to have noticed an increase in the usage of QR codes since mid-March 2020. As the need for touchless transactions increased due to COVID-19, 83% of r… Continue reading Most users don’t know the capabilities and risks of QR codes

Get your firm to say goodbye to password headaches

Passwords are problematic. They can be costly and burdensome for businesses to manage, can cause poor user experience, and they are easily compromised. It’s no wonder, then, that many enterprises are expected to shift to passwordless authentication for… Continue reading Get your firm to say goodbye to password headaches