Endpoint May 4, 2015 Mobile Avengers: Smashing Security Foes and Woes 2 min read - Mobile app management and a corporate app store provide good training grounds for increased security in a controlled mobile state.
April 28, 2015 Bodyprint Biometrics: Are People the New Password? 2 min read - Yahoo has introduced a new type of biometric security, Bodyprint, which allows users to unlock their mobile devices with multiple body parts.
April 27, 2015 New iOS 8 Vulnerability Taps Worrisome Wi-Fi Exploit 2 min read - A new type of iOS 8 vulnerability combines WiFiGate and an SSL compromise to cripple iPhones, according to mobile security firm Skycure.
April 17, 2015 Dropbox Bounty: Big Bucks for Bugs? 2 min read - The new Dropbox bounty program looks to catch software vulnerabilities in their infancy by rewarding researchers. So far, payouts have no maximum.
Endpoint April 15, 2015 Hiding Behind Android Runtime 4 min read - I recently gave a presentation at Black Hat Asia in Singapore. My talk discussed possible ways to create user-mode rootkits in the new Android Runtime.
Application Security April 13, 2015 Think You’re Immune From Mobile Malware Attacks? Think Again 4 min read - While users have improved when it comes to detecting possible threats on their computers, they may be less wary when it comes to their mobile devices.
Application Security April 3, 2015 Mobile Payment Technology: Secure or Subpar? 3 min read - With the growing popularity of Apple Pay, Google Wallet and Venmo, users are wondering whether mobile payment technology is secure and safe to use.
March 24, 2015 Listen Up: IP Phones From Cisco Enable Eavesdropping 2 min read - IP phones from Cisco are reportedly vulnerable to remote eavesdropping, causing many businesses to be wary of using them until they are fixed.
Risk Management March 20, 2015 How Organizations Can Rebound From March Madness Mobile Misuse 3 min read - With the help of mobile threat management and user education, your organization can make sure the only March Madness upsets that occur are on the court.
Software Vulnerabilities March 11, 2015 DroppedIn: Remotely Exploitable Vulnerability in the Dropbox SDK for Android 8 min read - IBM X-Force has discovered a vulnerability in Dropbox SDK for Android that lets attackers connect mobile apps to Dropbox accounts that they control.