HackDig : Dig high-quality web security articles for hackers

Managed Data Activity Monitoring (DAM) Is More Important Than Ever

The transition to a remote workforce has happened so quickly that many security teams have not had an opportunity to apply desired controls. Organizations are dealing with remote access and execution privileges that were unplanned even a couple of months ago. The use of personal devices and home workspaces has increased potential risks. Typical controls such
Publish At:2020-06-03 09:20 | Read:68 | Comments:0 | Tags:Data Protection Risk Management Security Services Compliance

SMBs Are Ready to Grow Into Enterprise Mobility Management (EMM) and Beyond

In the tech industry, “enterprise” is often equated to large businesses, but when it comes to enterprise mobility management (EMM), we should expand our definition. Why? Small and mid-size businesses (typically firms with 100-999 workers) today need the same mobile device, app and content management capabilities as the big guys. Many of these sma
Publish At:2020-05-24 06:18 | Read:73 | Comments:0 | Tags:Endpoint Mobile Security Connected Devices Endpoint Manageme

COVID-19’s Remote Workforce: Protect Your Rapidly Growing Attack Surface

As organizations adapt and respond to the impact of COVID-19, significant new challenges are on the rise as a majority of the workforce has shifted to remote work arrangements. Employee-owned devices and home networks that were not formerly protected by enterprise security controls have rapidly expanded many organizations’ attack surfaces. At the same
Publish At:2020-04-17 13:00 | Read:423 | Comments:0 | Tags:CISO Security Services Threat Hunting Threat Intelligence Co

Phishers and iPhone Thieves Rolling Out Multimillion-Dollar Operations

IBM X-Force Incident Response and Intelligence Services (IRIS) researchers recently went down the rabbit hole of a physical iPhone theft that was followed by a SMiShing campaign designed to unlock the phone for resale on the black market. As we looked into what was behind the phish, we found a thriving and large-scale operation of over 600 phishing domains d
Publish At:2020-04-09 06:33 | Read:509 | Comments:0 | Tags:Mobile Security Threat Intelligence Apple Cloud Cloud Securi

TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany

IBM X-Force researchers recently analyzed an Android malware app that’s likely being pushed to infected users by the TrickBot Trojan. This app, dubbed “TrickMo” by our team, is designed to bypass strong authentication methods that bank customers use when they need to authorize a transaction. Though it’s not the first of its kind, this
Publish At:2020-03-24 07:55 | Read:358 | Comments:0 | Tags:Advanced Threats Risk Management Threat Intelligence Android

Zimperium Extends Mobile Security Leadership by Delivering First Complete Mobile Application Security Solution

New Mobile Application Protection Suite (MAPS) Identifies Security, Privacy and Compliance Issues During Development and Protects Apps While In Use  Mobile applications have become a business requirement for almost every organization. According to a recent report, four out of 10 large enterprises are planning to deliver more than 50 apps for their internal
Publish At:2020-03-09 09:40 | Read:482 | Comments:0 | Tags:App Security advanced mobile threat defense apps mobile devi

What Is Rich Communication Services? Breaking Down the Benefits and Security Risks

Texting has been around since the 1990s, and it has served us well. Users have sent countless messages, and these exchanges have facilitated such developments as SMS-based two-factor authentication (2FA) and Kenya’s SMS-based M-Pesa mobile payment system. But the world has since discovered countless other ways to message — methods that enable far more
Publish At:2020-03-03 09:50 | Read:417 | Comments:0 | Tags:Mobile Security Artificial Intelligence (AI) Authentication

Artificial Intelligence (AI) and Security: A Match Made in the SOC

Change is constant in cybersecurity — continual, rapid, dynamic change. It’s impossible to maintain an effective defensive posture without constantly evolving. Security measures that worked in the past will not be effective today, and today’s security controls will not be effective tomorrow. Many factors contribute to this rapid pace of change. A
Publish At:2020-02-09 10:30 | Read:543 | Comments:0 | Tags:Artificial Intelligence Analysts Artificial Intelligence (AI

Zimperium Integrates Mobile Threat Defense into Microsoft Defender Advanced Threat Protection

The days of “leaving work at your desk” are long gone. Today, employees are mixing business with pleasure at all hours, in different places. It could be checking your email at halftime of your daughter’s soccer game; reviewing an Excel sales forecast spreadsheet while waiting for a friend at dinner; or, finishing up an overseas partner call while in line fo
Publish At:2020-01-23 17:25 | Read:640 | Comments:0 | Tags:Mobile Security advanced mobile threat defense BYOD mobile d

TikTok is the Rule, Not the Exception, When it Comes to Mobile App Privacy and Security Risks

Unfortunately for TikTok, 2020 isn’t starting off well. The video-sharing social networking service that was under fire by U.S. legislatures in 2019, is being banned by the U.S. Army, prohibiting soldiers from using it on government-owned devices, citing a potential security risk. Army spokeswoman Lt. Col. Robin Ochoa told Military.com the Chinese social me
Publish At:2020-01-06 14:10 | Read:702 | Comments:0 | Tags:App Security Android apps iOS mobile devices Mobile security

Top 5 Mobile Security Stories of 2019

Mobile security has certainly seen its fair share of headlines in 2019 prompting individuals and enterprises to realize mobile devices are another endpoint – like laptops and computers – in need of protecting. I thought it would be fun to look back at some of those stories that helped propel mobile security into the forefront of the minds of CIS
Publish At:2019-12-20 17:25 | Read:732 | Comments:0 | Tags:Mobile Security Mobile Threat Defense News advanced mobile t

The little-known ways mobile device sensors can be exploited by cybercriminals

The bevy of mobile device sensors in modern smartphones and tablets make them more akin to pocket-sized laboratories and media studios than mere communication devices. Cameras, microphones, accelerometers, and gyroscopes give incredible flexibility to app developers and utility to mobile device users. But the variety of inputs also give clever hackers new me
Publish At:2019-12-11 16:50 | Read:1269 | Comments:0 | Tags:IoT accelerometer Android camera Google gyroscope Internet o

Chinese Hackers Reportedly Target Belgian Trade Mission

A recent Belgian economic mission to China was reportedly a target of multiple cyberattacks. According to multiple news reports, attacks were carried out at a hotel in Beijing where the convoy was staying. Hackers placed three mobile masts around the hotel to which all connections go, and targeted smartphones with the Bluetooth function turned on.  This att
Publish At:2019-11-25 19:10 | Read:819 | Comments:0 | Tags:News cyber security mobile devices

How to Increase your Mobile Device Security with MobileIron MTD (Powered by Zimperium)

To alleviate all user adoption issues and provide complete mobile security, MobileIron has integrated Zimperium’s technology directly into the MobileIron agent. Known as “MobileIron Threat Defense,” this enables unparalleled on-device detection and remediation of mobile threats. Since 2007, MobileIron has been the leader in mobile enterprise security.
Publish At:2019-11-12 00:25 | Read:816 | Comments:0 | Tags:Mobile Security Mobile Threat Defense advanced mobile threat

Zimperium and VMware Partner to Deliver Mobile Threat Data into VMware Workspace ONE Intelligence

As the global leader in mobile device and app security, Zimperium is excited to announce that we have joined the VMware Workspace ONE Trust Network. As part of this network, we will be leveraging VMware’s newly announced API to provide mobile threat data directly into VMware Workspace ONE Intelligence.    VMware Workspace ONE Trust Network The Workspace ONE
Publish At:2019-11-12 00:25 | Read:832 | Comments:0 | Tags:Mobile Security Mobile Threat Defense advanced mobile threat

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud