HackDig : Dig high-quality web security articles for hacker

MDM solutions don’t deliver sufficient protection against Pegasus

Since Lookout first announced our discovery of the Pegasus attack and Trident vulnerabilities in partnership with Citizen Lab, we’ve received many clarifying questions from security professionals. In this series we’re answering the top queries we’ve received to help you better understand the facts around this unprecedented mobile threat. T
Publish At:2016-09-03 11:45 | Read:3996 | Comments:0 | Tags:Security Uncategorized jailbreak MDM mobile attack mobile se

Pegasus and Trident: Your questions answered

Since Lookout first announced our discovery of the Pegasus attack and Trident vulnerabilities in partnership with Citizen Lab, we’ve received many clarifying questions from security professionals. In this series we’re answering the top queries we’ve received to help you better understand the facts around this unprecedented mobile threat. P
Publish At:2016-09-03 11:45 | Read:3867 | Comments:0 | Tags:Security 9.3.5 CIO CISO encryption iOS MDM mobile attack mob

Now available: The Practical Guide to Enterprise Mobile Security

The Practical Guide to Enterprise Mobile Security is a one-stop shop for enterprise IT teams looking to enable mobile productivity in their organizations, while simultaneously reducing the risks inherent to mobile devices. In it, you’ll get actionable information on every element of mobile security from what threats look like on mobile to how to buy a mobil
Publish At:2016-08-10 20:55 | Read:3136 | Comments:0 | Tags:Enterprise Mobile Security EMM enteprise mobile security ent

SideStepper method allows to infect iOS devices via MDM Solutions

SideStepper is a method to install malicious apps on iOS devices by abusing the mobile device management (MDM) solutions. Security researchers from the Check Point firm have devised a method to install a malicious code on iOS devices by abusing the mobile device management (MDM) solutions used by many enterprises. The technique relies on a vulnerability dubb
Publish At:2016-04-01 03:35 | Read:3452 | Comments:0 | Tags:Breaking News Hacking Mobile Security Apple iOS iOS malware

Threat protection and EMM: What the relationship means for CIOs

Good security relies on strong relationships. The security industry wants to work with hackers, to learn from them and understand their modes of thinking. Security professionals want to share information to ensure everyone understands the broad scope of threats and what they can do to corporate data. Similarly, security technologies want to connect together
Publish At:2015-09-25 08:05 | Read:2832 | Comments:0 | Tags:Enterprise Mobile Security EMM MDM Threat protection IOS

Does Your BYOD Policy Allow Bad Apps

BYOD policies enable economies of scale but also introduce vulnerabilities to the enterprise. Many employees unknowingly bring malicious apps to work compromising identities and enabling conduits for spies. But what is the effect of BYOD on enterprise security? What are the best-practice policies for organizations looking to embrace this new
Publish At:2015-02-11 04:05 | Read:3367 | Comments:0 | Tags:Events Mobile security app management app reputation BYOD BY

Mobile Device Management and The Mobile Threatscape

Mobile Device Management (MDM) solutions are perceived to be the ultimate solution for mobile security in the enterprise. According to Gartner’s October 2012 report: “Over the next five years, 65 percent of enterprises will adopt a mobile device management (MDM) solution for their corporate liable users.”But do MDM solutions really provide the security
Publish At:2014-10-27 12:05 | Read:2682 | Comments:0 | Tags:Featured Articles IT Security and Data Protection BYOD devic

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud