The Latest in IT Security

1

Despite widespread concern about the security of mobile and Internet of Things applications, organizations are ill-prepared for the risks they pose, according to research conducted by the Ponemon Institute. Mobile and IoT applications are distributed, out in the wild, and easy targets for attackers. While mobile apps have been around for some time, most companies […]

Read more ...

1

That’s right, freezing apples, and we aren’t talking about a frost warning at your local apple orchard. A video has been found to freeze (a.k.a. cause a denial of service attack) on various models of Apple mobile devices according to YouTuber, EverythingApplePro, and reported by Bleeping Computer. Read More

Read more ...

1

New variants of Android.Lockscreen are using pseudorandom passcodes to prevent victims from unlocking devices without paying the ransom. Previous versions of these threats locked the screen and used a hardcoded passcode, but analysts were able to reverse engineer the code to provide victims with the passcode to unlock their devices. Attackers have also combined a […]

Read more ...

1

When a message carrying sensitive information is intercepted, whether accidentally or maliciously, an entire corporation stands on the shaky grounds of potential downfall, from branding to the bottom line. Regardless of whether or not communicating in this form is allowed in your organization, chances are your users are doing so insouciantly.

Read more ...

Categories

FRIDAY, MARCH 24, 2017

Featured

Archives

Latest Comments

Social Networks