Clone or Swap? SIM Card Vulnerabilities to Reckon With

SIM card vulnerabilities leave organizations exposed to SIM swapping and SIM cloning attacks. IBM X-Force findings from dark web analysis suggest these threats are not slowing down anytime soon.

The post Clone or Swap? SIM Card Vulnerabilities to Reckon With appeared first on Security Intelligence.

Continue reading Clone or Swap? SIM Card Vulnerabilities to Reckon With

Why Zero Trust Is Critical to a Productive Mobile Workforce

Businesses undergoing digital transformation are adopting the zero trust model to help manage the flow of corporate data to mobile devices.

The post Why Zero Trust Is Critical to a Productive Mobile Workforce appeared first on Security Intelligence.

Continue reading Why Zero Trust Is Critical to a Productive Mobile Workforce

How Video Became a Dangerous Delivery Vehicle for Malware Attacks

Reading Time: 4 minutes The lure of video might be the perfect social engineering trick for malware attacks. Here’s how your enterprise security team can fight back.

The post How Video Became a Dangerous Delivery Vehicle for Malware Attacks appeared first on Security Intelligence.

Continue reading How Video Became a Dangerous Delivery Vehicle for Malware Attacks

7 Can’t-Miss Cybersecurity Lessons From Black Hat USA and Vegas Security Week

Reading Time: 5 minutes Black Hat USA and DEF CON revealed some shocking developments in IoT and biometric security, providing important cybersecurity lessons for enterprise security professionals.

The post 7 Can’t-Miss Cybersecurity Lessons From Black Hat USA and Vegas Security Week appeared first on Security Intelligence.

Continue reading 7 Can’t-Miss Cybersecurity Lessons From Black Hat USA and Vegas Security Week

5G Technology Is Coming, But Is It Already Filled With Security Flaws?

Reading Time: 3 minutes There is a lot to be excited about with 5G technology, but it will also open more doors for threat actors to get into networks, making it more difficult to effectively protect endpoints and data.

The post 5G Technology Is Coming, But Is It Already Filled With Security Flaws? appeared first on Security Intelligence.

Continue reading 5G Technology Is Coming, But Is It Already Filled With Security Flaws?

How to Reduce the Risk Posed by Vulnerable Mobile Apps

With so many risky mobile apps out there, one way of reducing this risk is to start looking into your BYOD practices and determining if they make sense for your organization.

The post How to Reduce the Risk Posed by Vulnerable Mobile Apps appeared first on Security Intelligence.

Continue reading How to Reduce the Risk Posed by Vulnerable Mobile Apps

New FinSpy iOS and Android implants revealed ITW

FinSpy is used to collect a variety of private user information on various platforms. Since 2011 Kaspersky has continuously monitored the development of this malware and the emergence of new versions in the wild. According to our telemetry, several dozen unique mobile devices have been infected over the past year, with recent activity recorded in Myanmar in June 2019. Continue reading New FinSpy iOS and Android implants revealed ITW

Mobile Device Management Evolves to Support New Device Use Cases

As new deployments of screens, IoT devices and other connected endpoints proliferate, mobile device management is key to helping businesses secure, manage and control new mobile-oriented use cases.

The post Mobile Device Management Evolves to Support New Device Use Cases appeared first on Security Intelligence.

Continue reading Mobile Device Management Evolves to Support New Device Use Cases