BlackBerry Moves to Strengthen Ties with the US Government (Thank God)

BlackBerry has successfully transitioned from being a smartphone vendor to something very different. They still have the leading operating system for automobiles and nuclear power plants (QNX), which is arguably (and has to be) the most secure in segme… Continue reading BlackBerry Moves to Strengthen Ties with the US Government (Thank God)

Forrester: Ransomware Set to Resurge As Firms Pay Off Attacks

In this video, Josh Zelonis, senior analyst at Forrester Research, discusses the next great security threats to enterprises. Continue reading Forrester: Ransomware Set to Resurge As Firms Pay Off Attacks

Hey Siri, Get My Coffee, Hold the Malware

According to IBM X-Force IRIS research, there are several security concerns that should be taken into consideration before using Siri Shortcuts.

The post Hey Siri, Get My Coffee, Hold the Malware appeared first on Security Intelligence.

Continue reading Hey Siri, Get My Coffee, Hold the Malware

The Rotexy mobile Trojan – banker and ransomware

On the back of a surge in Trojan activity, we decided to carry out an in-depth analysis and track the evolution of some other popular malware families besides Asacub. One of the most interesting and active specimens to date was a mobile Trojan from the Rotexy family. Continue reading The Rotexy mobile Trojan – banker and ransomware

Roaming Mantis part III: iOS crypto-mining and spreading via malicious content delivery system

In Q2 2018, Kaspersky Lab published two blogposts about Roaming Mantis sharing details of this new cybercriminal campaign. During our research, it became clear that Roaming Mantis has been rather active and has evolved quickly. The group’s malware now supports 27 languages, including multiple countries from Asia and beyond, Europe and the Middle East. Continue reading Roaming Mantis part III: iOS crypto-mining and spreading via malicious content delivery system

Which Mobile Threats Do You Need to Prepare For?

As the workforce has embraced digital transformation, the volume and frequency of mobile threats has skyrocketed. Which threats should your organization be worried about?

The post Which Mobile Threats Do You Need to Prepare For? appeared first on Security Intelligence.

Continue reading Which Mobile Threats Do You Need to Prepare For?

BlackBerry Massively Steps Up Security Efforts to Address Threat Storm

BlackBerry continues to execute on their pivot to become a software, services, and device security firm. This doesn’t mean they don’t still have interesting smartphones, their licensed Key2 phone is arguably one of the most impressive secur… Continue reading BlackBerry Massively Steps Up Security Efforts to Address Threat Storm

A Brief History of iOS: The Evolution of MDM and Enterprise Mobility

As the mobile threat landscape has expanded over the past decade, Apple’s iOS releases have added new MDM features to help security professionals protect enterprise networks.

The post A Brief History of iOS: The Evolution of MDM and Enterprise Mobility appeared first on Security Intelligence.

Continue reading A Brief History of iOS: The Evolution of MDM and Enterprise Mobility

Risky Mobile Apps No Fun for Entertainment Sector

In case it’s not already on your risk radar, it’s time to add mobile apps to the growing list of threat vectors. Mobile apps are risky across all sectors, but more specifically, those that come from media and entertainment businesses are putting users… Continue reading Risky Mobile Apps No Fun for Entertainment Sector