Endpoint November 2, 2016 Windows 10: Here to Stay in a Big Way 6 min read - With Windows 10, Microsoft sought to make the tools employees have grown to love compatible with the smartphones and tablets they prefer to use on the go.
Application Security October 25, 2016 Mobile Payments: Should Security Overshadow Convenience? 4 min read - The mobile payments market is booming as consumers and merchants increasingly adopt new technology. With convenience, however, come new security concerns.
Endpoint October 24, 2016 GM Bot: Alive and Upgraded, Now on Android M 3 min read - Researchers discovered a new version of banking Trojan GM Bot that enables cybercriminals to bypass security features included with Android Lollipop.
October 18, 2016 Victims of Vanity? New Android Trojan Asks for Selfies to Bypass Security 3 min read - Just when it seems like malware-makers have reached the end of their ingenuity, a new Android Trojan asks users to take selfies while holding up their IDs.
Application Security October 5, 2016 Why Do We Care So Little About Application-Layer Protection? 3 min read - In the current world of cloud and agile development, we deliver code monthly, weekly and even daily. One of my engineering teams at IBM affectionately refers to updates as the “daily dose.” We have developed robust processes to ensure that…
October 4, 2016 Android Lockscreen Ransomware Amps Up Annoyance With Pseudorandom Passcodes 2 min read - Generally speaking, lockscreen ransomware ranks on the not-so-sophisticated end of the malware spectrum. As noted by Information Age, this type of ransomware can be a mere “nuisance” when confined to a single PC or laptop. When it comes to mobile…
October 3, 2016 Mobile Security News Roundup: Top Stories From September 2 min read - September was another huge month for mobile security news. Headlines included new security features for Android devices and the launch of a $12,000 phone.
Endpoint September 20, 2016 What I Learned About Smartphone Dependency on a Himalayan Trek 3 min read - As smartphone use skyrockets in India, so does the threat of cyberattacks against Indian government agencies, banks, businesses and individual users.
Cloud Security September 19, 2016 Tame the Dangerous Combination of Mobile and Cloud With EMM and a CASB 3 min read - Many security analysts use either an EMM solution or CASB to protect their enterprise, but few recognize the importance of deploying both.
September 16, 2016 Windows Trojan Spreads to Android and iOS Devices Via USB 2 min read - Windows Trojan DualToy, which had previously infected Windows PCs exclusively, branched out to attack Android and iOS devices connected to PCs via USB.