April 27, 2015 New iOS 8 Vulnerability Taps Worrisome Wi-Fi Exploit 2 min read - A new type of iOS 8 vulnerability combines WiFiGate and an SSL compromise to cripple iPhones, according to mobile security firm Skycure.
Endpoint April 27, 2015 Data and Content Security for the Mobile-First World 3 min read - Employees and enterprises are operating in an increasingly mobile-first world. Because of this, content security is of the utmost importance to executives.
April 23, 2015 Research Suggests Being Hit by Mobile Malware Is as Rare as Being Struck by Lightning 2 min read - Damballa unveiled results of a two-year study at the RSA Conference that showed mobile malware threats may be overhyped — as rare as a lightning strike.
Endpoint April 23, 2015 Medicating Health Care’s Mobile Malware Maladies With Threat Management 3 min read - Labeled vulnerable to cyberattacks such as mobile malware by the FBI, health care organizations need to develop strong mobile security strategies in 2015.
Software Vulnerabilities April 21, 2015 CVE-2015-1097: Deobfuscating iOS Kernel Pointers With an IBM X-Force-Discovered Vulnerability 4 min read - IBM's X-Force Application Security Research Team has discovered a memory disclosure vulnerability in iOS IOKit IOMobileFrameBuffer.
Endpoint April 20, 2015 Mobile Device Management to Security: “I’m Not Dead Yet!” 3 min read - Mobile device management should not be discounted as a service since 32 percent of mobile security incidents are caused by lost devices.
April 17, 2015 Dropbox Bounty: Big Bucks for Bugs? 2 min read - The new Dropbox bounty program looks to catch software vulnerabilities in their infancy by rewarding researchers. So far, payouts have no maximum.
April 17, 2015 Verizon Report Suggests Data Breach Costs and Mobile Threat Perceptions Inaccurate 2 min read - Security experts may be overestimating the cost of a data breach and the extent of mobile device threats, according to a report from Verizon.
Endpoint April 15, 2015 Hiding Behind Android Runtime 4 min read - I recently gave a presentation at Black Hat Asia in Singapore. My talk discussed possible ways to create user-mode rootkits in the new Android Runtime.
Endpoint April 13, 2015 Mobile Security Framework: How to Keep Enterprises Secure 3 min read - In order to combat potential data breaches, organizations must focus their attention on mobile security and bring-your-own-device policies.