According to Gartner’s 2019 Hype Cycle for Endpoint Security, “As traditional endpoint security remodernizes and mobile security innovation slows down, the two areas have reached similar levels of maturity. The convergence between mobile and more-traditional endpoints will increasingly allow security leaders to define common endpoint security strategies for all endpoint devices.” As such, it’s important … Read More
Posts in "Mobile Threat Defense"
In the first three blogs of this series, I discussed why mobile devices are easy prey, what data is at risk, and how mobile devices can be hacked. For the final blog in this series, I will discuss how to fully protect your mobile device. Operating systems like iOS and Android are fundamentally different than … Read More
In an excellent and deep blog analysis, Ian Beer of Google’s Project Zero outlines five separate iOS exploit chains that were found on a small collection of hacked websites. The hacked sites were being used in indiscriminate watering hole attacks against their visitors, using iOS 0-day. (For another watering hole attack example, please see our … Read More
Liberation. It’s a powerful word. It’s about freedom from limits on thought or behavior. The reason why I bring this up is because I recently heard from a prospect of mine, here in London, who mentioned he was liberating his employees by giving them the ability to work away from the office. As part of … Read More
“The good, the bad and the ugly” is a well-known expression, but when it comes to mobile phishing, I suggest shifting the order. Let’s talk about the bad, the ugly and the good. The Bad: Mobile Takes Phishing from Bad to Worse Phishing is one of the most dominant attack techniques in cyber security. Phishing … Read More