HackDig : Dig high-quality web security articles for hacker

What exactly is a mobile ______ attack?

Mobile devices contain or have access to the same information as traditional endpoints. While billions of dollars have been spent protecting and securing traditional endpoints, very little has been invested to protect mobile device endpoints. Attackers work on the same model as any other business: where do they get the greatest return on their investment of
Publish At:2019-09-19 14:33 | Read:72 | Comments:0 | Tags:Android App Security iOS Mobile Malware Mobile Security Mobi

The Bad, The Ugly & The Good of Mobile Phishing Protection

“The good, the bad and the ugly” is a well-known expression, but when it comes to mobile phishing, I suggest shifting the order. Let’s talk about the bad, the ugly and the good. The Bad: Mobile Takes Phishing from Bad to Worse Phishing is one of the most dominant attack techniques in cyber security.  Phishing has a very low barrier of entry, attacks can be
Publish At:2019-09-19 14:33 | Read:70 | Comments:0 | Tags:Mobile Security Mobile Threat Defense advanced mobile threat

Don’t Let Liberating Your Employees Give Freedom to Hackers

Liberation. It’s a powerful word. It’s about freedom from limits on thought or behavior.  The reason why I bring this up is because I recently heard from a prospect of mine, here in London, who mentioned he was liberating his employees by giving them the ability to work away from the office. As part of this, he would allow them to work from home on their mo
Publish At:2019-09-19 14:33 | Read:83 | Comments:0 | Tags:Mobile Security Mobile Threat Defense advanced mobile threat

Malicious Websites Put iOS Devices At Risk

In an excellent and deep blog analysis, Ian Beer of Google’s Project Zero outlines five separate iOS exploit chains that were found on a small collection of hacked websites. The hacked sites were being used in indiscriminate watering hole attacks against their visitors, using iOS 0-day. (For another watering hole attack example, please see our recent blog,
Publish At:2019-09-19 14:33 | Read:100 | Comments:0 | Tags:iOS Machine Learning Mobile Security Mobile Threat Defense T

It’s Not Your Father’s Endpoint | How Do You Protect Mobile Devices?

In the first three blogs of this series, I discussed why mobile devices are easy prey, what data is at risk, and how mobile devices can be hacked. For the final blog in this series, I will discuss how to fully protect your mobile device.  Operating systems like iOS and Android are fundamentally different than a typical desktop OS like Windows. As a result,
Publish At:2019-09-19 14:33 | Read:88 | Comments:0 | Tags:Mobile Security Mobile Threat Defense mobile attacks Mobile

The Other Half of the Equation: How MTD Completes EPP/EDR

According to Gartner’s 2019 Hype Cycle for Endpoint Security, “As traditional endpoint security remodernizes and mobile security innovation slows down, the two areas have reached similar levels of maturity. The convergence between mobile and more-traditional endpoints will increasingly allow security leaders to define common endpoint security strategies for
Publish At:2019-09-19 14:33 | Read:31 | Comments:0 | Tags:Mobile Security Mobile Threat Defense advanced mobile threat

The Other Half of the Equation: Why UEMs Need MTD

According to Gartner’s 2019 Hype Cycle for Endpoint Security, “Enterprises with average security requirements that do not provide much more than email to their mobile users, address mobile security today by establishing a security baseline and enforcing it via unified endpoint management (UEM).”  UEM is a class of software tools that provide a single manage
Publish At:2019-09-19 14:33 | Read:59 | Comments:0 | Tags:Mobile Security Mobile Threat Defense advanced mobile threat

My Four Truths (So Far) Regarding Mobile Security

I started working at Zimperium late January this year in the marketing communications department, and well…I’m busy.   Every day is something new. Monday – OS problem. Tuesday – “Joker” malware downloaded. Wednesday – Phones could be hacked with a single text message. Thursday – Phishing scams on the rise. Friday – OS pat
Publish At:2019-09-19 14:33 | Read:10 | Comments:0 | Tags:Mobile Security Mobile Threat Defense Enterprise Mobile and

Securing Medical Devices in the Age of the IoT

The U.S. Food and Drug Administration (FDA) cautioned the health care industry to be wary about networked medical devices containing off-the-shelf (OTS) software that can connect to networks. Both health care IT professionals and manufacturers are responsible for securing medical devices by performing regular software updates and applying security patches. S
Publish At:2017-11-06 09:40 | Read:3476 | Comments:0 | Tags:Endpoint Health Care Mobile Security Connected Devices Feder

Preparing for the iPhone X and the Future of Facial Recognition Technology

As we approach the holiday season, both consumers and IT professionals are considering replacing their old devices with a whole new lineup of smartphones, phablets and tablets. Whether you’re treating yourself, adding to your wish list or considering options for your next enterprise rollout, it’s important to weigh the pros and cons of introducin
Publish At:2017-11-04 02:00 | Read:3053 | Comments:0 | Tags:Mobile Security Apple Authentication Biometric Mobile Securi

Investigating IoT Crime in the Age of Connected Devices

People are beginning to get used to the easy life enabled by smart homes and the Internet of Things (IoT), but they are at risk if they do not prioritize security. The IoT has increased quality of life for many; it has helped the differently abled and the elderly to continue living independently and laid the technological groundwork for another industrial re
Publish At:2017-10-27 14:00 | Read:3802 | Comments:0 | Tags:Fraud Protection Mobile Security Security Intelligence & Ana

Enterprise Mobility Management Even the Apprentice Can Control

Everyone else had already left for the day, but the Apprentice felt like his day was just beginning. He knew his internship with the IT department at Wizard, Inc. would be a challenge, but he never expected how challenging his final project — enterprise mobility management (EMM) — would be. The chief information officer (CIO) tasked him with securing all dev
Publish At:2017-10-23 17:50 | Read:2744 | Comments:0 | Tags:Mobile Security Topics Enterprise Mobility Enterprise Mobili

Validating Machine Learning Detection of Mobile Malware

Zimperium’s core machine learning engine, z9, has a proven track record of detecting zero-day exploits. We recently announced an extension of the framework that detects previously unknown mobile malware. This extension is known as “z9 for Mobile Malware”, and was officially announced in September 2017. Internally, the code name has been “Cogito”, so this res
Publish At:2017-10-21 13:50 | Read:4875 | Comments:0 | Tags:Android Mobile Malware Mobile security Mobile Threat Defense

Detecting KRACK Man in the Middle Attacks

What is KRACK? KRACK (Key Reinstallation attaCKs, KRACKs) is a serious weakness in the WPA2 protocol. WPA2 secures all modern protected Wi-Fi networks including those used by smartphones. Attackers within physical range of a Wi-Fi network can exploit protocol weaknesses by using key reinstallation attacks. The attack works against all modern protected Wi-Fi
Publish At:2017-10-21 13:50 | Read:4533 | Comments:0 | Tags:Mobile security Mobile Threat Defense Threat Research KRACK

Internet-Connected Toys: Cute, Cuddly and Inherently Insecure

After the FBI issued a warning on internet-connected toys in July, researchers began digging into these devices to assess their functions as they relate to cybersecurity. But before describing what one of these toys can do, it might be helpful to explain how they work at a very high level. Typical Components of Internet-Connected Toys The first component of
Publish At:2017-09-18 17:25 | Read:4294 | Comments:0 | Tags:Cloud Security Mobile Security Cloud Cloud Applications Conn

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud