Mobile-First Phishing Kit Targets Verizon Customers
The kit’s authors demonstrate a knowledge of Verizon’s infrastructure. Continue reading Mobile-First Phishing Kit Targets Verizon Customers
Collaborate Disseminate
The kit’s authors demonstrate a knowledge of Verizon’s infrastructure. Continue reading Mobile-First Phishing Kit Targets Verizon Customers
BlackBerry has successfully transitioned from being a smartphone vendor to something very different. They still have the leading operating system for automobiles and nuclear power plants (QNX), which is arguably (and has to be) the most secure in segme… Continue reading BlackBerry Moves to Strengthen Ties with the US Government (Thank God)
In this video, Josh Zelonis, senior analyst at Forrester Research, discusses the next great security threats to enterprises. Continue reading Forrester: Ransomware Set to Resurge As Firms Pay Off Attacks
According to IBM X-Force IRIS research, there are several security concerns that should be taken into consideration before using Siri Shortcuts.
The post Hey Siri, Get My Coffee, Hold the Malware appeared first on Security Intelligence.
On the back of a surge in Trojan activity, we decided to carry out an in-depth analysis and track the evolution of some other popular malware families besides Asacub. One of the most interesting and active specimens to date was a mobile Trojan from the Rotexy family. Continue reading The Rotexy mobile Trojan – banker and ransomware
In Q2 2018, Kaspersky Lab published two blogposts about Roaming Mantis sharing details of this new cybercriminal campaign. During our research, it became clear that Roaming Mantis has been rather active and has evolved quickly. The group’s malware now supports 27 languages, including multiple countries from Asia and beyond, Europe and the Middle East. Continue reading Roaming Mantis part III: iOS crypto-mining and spreading via malicious content delivery system
As the workforce has embraced digital transformation, the volume and frequency of mobile threats has skyrocketed. Which threats should your organization be worried about?
The post Which Mobile Threats Do You Need to Prepare For? appeared first on Security Intelligence.
Continue reading Which Mobile Threats Do You Need to Prepare For?
BlackBerry continues to execute on their pivot to become a software, services, and device security firm. This doesn’t mean they don’t still have interesting smartphones, their licensed Key2 phone is arguably one of the most impressive secur… Continue reading BlackBerry Massively Steps Up Security Efforts to Address Threat Storm
As the mobile threat landscape has expanded over the past decade, Apple’s iOS releases have added new MDM features to help security professionals protect enterprise networks.
The post A Brief History of iOS: The Evolution of MDM and Enterprise Mobility appeared first on Security Intelligence.
Continue reading A Brief History of iOS: The Evolution of MDM and Enterprise Mobility
In case it’s not already on your risk radar, it’s time to add mobile apps to the growing list of threat vectors. Mobile apps are risky across all sectors, but more specifically, those that come from media and entertainment businesses are putting users… Continue reading Risky Mobile Apps No Fun for Entertainment Sector