HackDig : Dig high-quality web security articles for hackers

Top 5 Mobile Security Stories of a Crazy 2020

2020 has been crazy… to say the least.  But in many ways, 2020 has thrust a huge spotlight on something we’ve known for quite some time – – mobile threats are real and mobile devices and apps need protection. It truly is crazy how many stories we’ve seen – and the year isn’t over yet – where the need for mobile security is front and
Publish At:2020-10-22 12:44 | Read:79 | Comments:0 | Tags:Mobile Security advanced mobile threat defense Android apps

Dutch MIVD Joins U.S. DoD in Acknowledging Mobile Device Threats

Recently, the Military Intelligence and Security Service division of the Dutch Armed Forces Central Command warned that businesses no longer meet using smartphones or tablets.  According to De Telegraaf (use Google Translate to translate), the highest boss of the Military Intelligence and Security Service (MIVD) advises large companies no longer to meet wit
Publish At:2020-10-21 10:07 | Read:64 | Comments:0 | Tags:Mobile Security Mobile Threat Defense DoD Dutch Armed Forces

Sweden Bans Huawei, ZTE From 5G, Calls China Biggest Threat

Sweden is banning Chinese tech companies Huawei and ZTE from building new high-speed wireless networks after a top security official called China one of the country’s biggest threats.The Swedish telecom regulator said Tuesday that four wireless carriers bidding for frequencies in an upcoming spectrum auction for the new 5G networks must not use equipment fro
Publish At:2020-10-21 07:28 | Read:87 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Wireless Security Risk M

How to Choose a Good Password

How to Choose a Good Password October 15th, 2020 No Comments Data Privacy, Data Protection, Mobile Security, Online Privacy, Online Safety, Passwords Passwords. We need them for almost everything nowadays. Entering our phones, our computers, social
Publish At:2020-10-14 23:17 | Read:200 | Comments:0 | Tags:Data Privacy Data Protection Mobile Security Online Privacy

BleedingTooth: Vulnerabilities in Linux Bluetooth Allow Zero-Click Attacks

Bluetooth vulnerabilities that a Google security researcher has identified in the Linux kernel could be exploited to run arbitrary code or access sensitive information.Referred to as BleedingTooth, the issues were identified by Andy Nguyen, a security engineer from Google, and are tracked as CVE-2020-12351, CVE-2020-12352, and CVE-2020-24490. They were intro
Publish At:2020-10-14 15:34 | Read:254 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Wireless Security Vulner

Cyber Warriors Sound Warning on Working From Home

Cyber warriors on NATO's eastern edge are warning that the growing number of people working from home globally due to the pandemic is increasing vulnerability to cyber attacks.The Baltic state of Estonia hosts two cyber facilities for the Western military alliance -- set up following a series of cyber attacks from neighbour Russia more than a decade ago."Lar
Publish At:2020-10-14 11:40 | Read:123 | Comments:0 | Tags:Cyberwarfare Mobile Security NEWS & INDUSTRY Identity &a

Zimperium is Honored to Protect U.S. Department of Defense Mobile Devices

As you may have seen in the news, the U.S. Department of Defense (DoD), through its Defense Information Systems Agency (DISA) and Defense Innovation Unit (DIU), selected Zimperium to deliver comprehensive Mobile Endpoint Protection (MEP) to service members around the world. Our mobile threat defense (MTD) solutions will protect DoD mobile endpoints against
Publish At:2020-10-14 09:44 | Read:111 | Comments:0 | Tags:Mobile Security Mobile Threat Defense News Department of Def

Top Belgium Telecoms Firm Drops Huawei

Belgium's dominant telecom operator Proximus said Friday that it will gradually replace its equipment from the Chinese manufacturer Huawei with products from Finnish supplier Nokia and Sweden's Ericsson.The sensitive decision comes at a time when the United States is heaping pressure on its European allies to shun equipment from Chinese firms in developing t
Publish At:2020-10-09 11:10 | Read:178 | Comments:0 | Tags:Cyberwarfare Mobile Security NEWS & INDUSTRY Wireless Se

Microsoft Warns of Android Ransomware Abusing Notification Services

Microsoft warned users on Thursday that it has spotted a sophisticated piece of Android ransomware that abuses notification services to display a ransom note.Android ransomware typically allows cybercriminals to make a profit not by encrypting files — such as in the case of ransomware targeting desktop systems — but by displaying a full-screen ransom note th
Publish At:2020-10-08 15:40 | Read:199 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Virus & Threats Viru

Google Readies Redesigned Security Alerts for Google Accounts

Google this week revealed that it’s working on redesigning the security alerts for Google accounts and that it will make them available directly in the applications users are logged into.The company has already built numerous protections into Google accounts and other Google products, with Safe Browsing delivering protection for over 4 billion devices, Gmail
Publish At:2020-10-08 11:46 | Read:182 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Privacy Virus & Thre

Best of Both Worlds: Integrating Zimperium Mobile Threat Data into Microsoft Sentinel Cloud-Native SIEM

While leading organizations are actively protecting mobile endpoints, security teams haven’t had clean and scalable ways to integrate and correlate threat data with other parts of the security infrastructure. But that is changing. I recently hosted a webinar with David Branscome, Senior Cloud Solutions Architect, Microsoft and our very own Kern Smith, Vice
Publish At:2020-10-07 10:26 | Read:159 | Comments:0 | Tags:Mobile Security Mobile Threat Defense cyber security Enterpr

Google Announces Android Partner Vulnerability Initiative

Google on Friday announced the Android Partner Vulnerability Initiative (APVI), an effort aimed at improving patching of security issues specific to Android OEMs.Through the new initiative, the tech giant also expects to improve transparency around vulnerabilities identified by Google’s own researchers, but which impact device models coming from the company’
Publish At:2020-10-05 09:40 | Read:226 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Vulnerabilities Mobile &

Cybersecurity Today: The Intersection of Technology and Behavior

In the movie “Back to the Future II,” protagonist Marty McFly travels forward to the year 2015. During a quick stop at Café 80s, Marty encounters two children, confused by the 80s-style arcade game in the store. When Marty shows them how to play, the kids retort with, “You mean you have to use your hands?” We may soon hav
Publish At:2020-09-30 12:45 | Read:225 | Comments:0 | Tags:Mobile Security Risk Management Security Services Cyber Risk

US Bans WeChat, TikTok Citing Privacy, National Security

The U.S. will ban the downloads of the Chinese apps TikTok and WeChat on Sunday, with a total ban on the use of the latter, citing national security and data privacy concerns.A total ban on the use of TikTok will follow on Nov. 12, but Commerce Secretary Wilbur Ross said early Friday on Fox Business Network that access to that app may be possible if certain
Publish At:2020-09-18 11:18 | Read:203 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Risk Management Mobile &

iOS 14 and iPadOS 14 Patch Vulnerabilities, Introduce New Privacy Features

Apple has patched nearly a dozen vulnerabilities and it has introduced new privacy features with the release of iOS 14 and iPadOS 14 this week.Each of the addressed security flaws impacts a different component of the operating system, namely AppleAVD, Assets, Icons, IDE Device Support, IOSurfaceAccelerator, Keyboard, Model I/O, Phone, Sandbox, Siri, and WebK
Publish At:2020-09-18 03:27 | Read:214 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Privacy Wireless Securit

Tools

Tag Cloud