Facebook sues data analytics firm OneAudience over malicious SDK

Facebook says OneAudience paid developers to install its social-media-profile-looting SDK into their apps to get marketing data for clients. Continue reading Facebook sues data analytics firm OneAudience over malicious SDK

Facebook, Twitter profiles slurped by mobile apps using malicious SDKs

Hundreds of users gave permission to these third-party apps to access their social media accounts, but the apps got more handsy than that.
Continue reading Facebook, Twitter profiles slurped by mobile apps using malicious SDKs

Facebook, Twitter profiles slurped by mobile apps using malicious SDKs

Hundreds of users gave permission to these third-party apps to access their social media accounts, but the apps got more handsy than that.
Continue reading Facebook, Twitter profiles slurped by mobile apps using malicious SDKs

Mobile Risks Boom in a Post-Perimeter World

The bloom is on mobile, whether it be the enterprise, employees or the cybercriminals plotting new ways to slip past a corporate defenses in a post-parameter world. Continue reading Mobile Risks Boom in a Post-Perimeter World

Enterprise Security Risk: Apps Capturing Corporate Mobile Screens

A recent advancement in crash reporting SDKs enables developers to record in-app screens, so that they know the exact state of an app before it crashes. This opens up doors for new exploits in enterprise mobile environments, as third-parties are increa… Continue reading Enterprise Security Risk: Apps Capturing Corporate Mobile Screens

3 Key Mobile Enterprise Threats in 2018

As attackers constantly innovate new exploitation and evasion techniques, enterprise security teams are having to stay ahead of a host of emerging threats. Often, these threats have been encountered in other enterprises, and shared knowledge of these t… Continue reading 3 Key Mobile Enterprise Threats in 2018

Abandoned Mobile C&C Servers Present Opportunity to Attackers

At Virus Bulletin, researchers explained the risks associated with abandoned SDK master servers that present attackers with an opportunity to assume control of these communication channels. Continue reading Abandoned Mobile C&C Servers Present Opportunity to Attackers