Tracking global cybercrime activity and the impact on the digital economy

A LexisNexis Risk Solutions report tracks global cybercrime activity from January 2020 through June 2020. The period has seen strong transaction volume growth compared to 2019 but an overall decline in global attack volume. This is likely linked to gro… Continue reading Tracking global cybercrime activity and the impact on the digital economy

Bring your own PC and SASE security to transform global businesses

Bring your own PC (BYOPC) security will reach mainstream adoption in the next two to five years, while it will take five to 10 years for mainstream adoption of secure access service edge (SASE) to take place, according to Gartner. Hype cycle for endpoi… Continue reading Bring your own PC and SASE security to transform global businesses

Don’t Remove Stalkerware Before Reading This Article

Stalkerware is technically software with malicious intent, but security professionals should treat it as a different beast from other malware. Stalkerware is an app or apps that someone else can install on your device to intercept text messages and phone calls, send call logs, record web browsing activity and keystrokes and even access your location. […]

The post Don’t Remove Stalkerware Before Reading This Article appeared first on Security Intelligence.

Continue reading Don’t Remove Stalkerware Before Reading This Article

TikTok Surreptitiously Collected Android User Data Using Google-Prohibited Tactic

App concealed the practice of gathering device unique identifiers using an added layer of encryption. Continue reading TikTok Surreptitiously Collected Android User Data Using Google-Prohibited Tactic

BadPower: Fast chargers can be modified to damage mobile devices

If you needed another reason not to use a charger made available at a coffeeshop or airport or by an acquaintance, here it is: maliciously modified fast chargers may damage your phone, tablet or laptop and set it on fire. Researchers from Tencent&#8216… Continue reading BadPower: Fast chargers can be modified to damage mobile devices

USB storage devices: Convenient security nightmares

There’s no denying the convenience of USB media. From hard drives and flash drives to a wide range of other devices, they offer a fast, simple way to transport, share and store data. However, from a business security perspective, their highly accessibl… Continue reading USB storage devices: Convenient security nightmares

Why Zero-Click Cyberthreats Should Be on Your Radar

For years, the statistics have told us that human error is the greatest contributor to cyberattacks. We’ve stressed the importance of training, training and more training to prevent the almost inevitable from happening. We’ve been convinced that the key to defending against cyberthreats is to keep the unsuspecting from clicking on phishing emails and infecting […]

The post Why Zero-Click Cyberthreats Should Be on Your Radar appeared first on Security Intelligence.

Continue reading Why Zero-Click Cyberthreats Should Be on Your Radar

Massive complexity endangers enterprise endpoint environments

There’s a massive amount of complexity plaguing today’s enterprise endpoint environments. The number of agents piling up on enterprise endpoint devices – up on average – is hindering IT and security’s ability to maintain foundational security hyg… Continue reading Massive complexity endangers enterprise endpoint environments

How do I select a mobile security solution for my business?

The percentage of companies admitting to suffering a mobile-related compromise has grown, despite a higher percentage of organizations deciding not to sacrifice the security of mobile devices to meet business targets. To make things worse, the C-suite … Continue reading How do I select a mobile security solution for my business?