Recently, two vulnerabilities were disclosed in the default iOS Mail application that have existed since 2012 (iOS 6). According to the disclosing company, ZecOps, both vulnerabilities allow remote code execution capabilities and enable an attacker to remotely infect a device. ZecOps has also reported that both vulnerabilities were triggered in-the-wild against high-value targets. Apple confirmed … Read More
According to the 2018 McKinsey Global Institute’s Smart Cities: Digital Solutions for a More Livable Future, more than half of the world’s population resides in cities, with another 2.5 billion new residents expected by 2050. Cities face increasing environmental pressures and infrastructure needs – and growing demands from residents to deliver a better quality of … Read More
Cybersecurity compromises are commonplace in the news, but rarely is it cited the compromise involved a mobile device. Attribution typically falls to vulnerabilities, social engineering, or data left in the open. With no mention of mobile devices, the perception is mobile devices are secure. In other words, there’s no smoke, so there’s no perceived fire … Read More
First in a series of four blogs on mobile device security Mobile devices – used today for everything from corporate and personal email access to tools used for company production – are very powerful computers. In fact, over the past several years, the rate of accessing the Internet via mobile devices has increased dramatically versus laptop and … Read More
In a tweet on September 6th, British Airways announced it was “investigating the theft of customer data from our website and our mobile app” (emphasis added). This is just another example of a breach that has been at least partially enabled by mobile apps. According to reports, information was exposed (including names, email addresses and … Read More