I had to do it. Afterall, I talk about it with customers and prospects daily. Had to see for myself. About a week ago, I was on a train in Australia. Heading from Melbourne to my home in Essendon at about 4:50pm. There were about 60 passengers riding along and I needed to finish up … Read More
Posts in "Mobile Malware"
According to Threatpost, another new malicious Android app – dubbed “Monokle”- is gaining attention. While Monokle has some interesting capabilities (e.g., making extensive use of Android accessibility services to exfiltrate data and predictive-text dictionaries to understand a target’s interests), it is still basically another malicious app. Monokle is a highly-targeted malicious app (Monokle has been … Read More
According to news reports, a new strain of Android malware has infected 25 million devices and modified legitimate apps with a malicious ads module. It’s believed the malware originated from a Chinese internet company that helps Chinese Android developers publish and promote their apps in foreign markets. The malware was disguised as Google-related updaters and … Read More
5 Must-Have Sections For Every Enterprise Mobile Security RFP – Must-Have #4: Security Technology & Workflow Integrations
Our fourth webinar in our series of “The 5 Must-Have Sections for Every Enterprise Mobile Security Request For Proposal (RFP)” reviews Security Technology & Workflow Integrations, and took place on July 17, 2019. Mobile security exists at an intersection where mobile technology professionals and security professionals both have key roles. An enterprise mobile security solution … Read More
In my first blog, I discussed why mobile devices are the likely choice for savvy attackers since they typically have no endpoint protection. Let’s understand what is on the device and how that can impact an enterprise/organization. The goal of an attacker that is targeting your organization, is not to get personally identifiable information data … Read More