HackDig : Dig high-quality web security articles for hacker

Corellium: Apple Sued Us After Failed Acquisition Attempt

Florida-based virtualization company Corellium claims that the copyright infringement lawsuit filed by Apple comes in response to a failed acquisition attempt.Corellium provides a virtual iPhone that can be used to find vulnerabilities and other types of bugs, and to test the functionality of mobile applications on different versions of the iPhone and the iO
Publish At:2019-11-14 22:15 | Read:67 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Mobile & Wireless Ma

Canada Spy Agencies Split Over Proposed Huawei 5G Ban: Media

Canada's spy agencies are divided over whether or not to ban Chinese technology giant Huawei from fifth generation (5G) networks over security concerns, the Globe and Mail reported Wednesday.The Canadian Security Intelligence Service (CSIS) and the Communications Security Establishment (CSE) were tasked with conducting a cybersecurity review to evaluate the
Publish At:2019-11-13 22:15 | Read:84 | Comments:0 | Tags:Cyberwarfare Mobile Security NEWS & INDUSTRY Virus &

How to Increase your Mobile Device Security with MobileIron MTD (Powered by Zimperium)

To alleviate all user adoption issues and provide complete mobile security, MobileIron has integrated Zimperium’s technology directly into the MobileIron agent. Known as “MobileIron Threat Defense,” this enables unparalleled on-device detection and remediation of mobile threats. Since 2007, MobileIron has been the leader in mobile enterprise security.
Publish At:2019-11-12 00:25 | Read:19 | Comments:0 | Tags:Mobile Security Mobile Threat Defense advanced mobile threat

Zimperium Analyzes TikTok’s Security and Privacy Risks

Several news outlets over the last few days are talking about how TikTok, the viral short video app where millions of teens post comedy skits set to music, is under fire from U.S. lawmakers.   CNN reports US lawmakers on both sides of the aisle warn that the app could pose a national security risk, and are calling on regulators and intelligence agencies to
Publish At:2019-11-12 00:25 | Read:73 | Comments:0 | Tags:App Security Mobile Threat Defense Android apps iOS mobile M

Zimperium Announces Mobile Threat Defense for BYOD users with Microsoft Intune

Today, Microsoft announced an exciting new capability providing additional benefits to users of apps protected by Microsoft Intune app protection policies. You can read the official announcement here. Zimperium device risk-based evaluation is now integrated with Microsoft Intune for protected apps on non-enrolled devices to add another layer of protection f
Publish At:2019-11-12 00:25 | Read:52 | Comments:0 | Tags:Mobile Security Mobile Threat Defense News Partners BYOD Ent

Zimperium and Google Partner to Fight Bad Apps through App Defense Alliance

We are thrilled to announce Google has selected us to help ensure the safety of the millions of apps in the Google Play Store through its App Defense Alliance.    As a member of the App Defense Alliance, Google will provide us access to mobile apps as they are being queued to publish in the Google Play Store. Through our advanced machine learning-based z9 t
Publish At:2019-11-12 00:25 | Read:97 | Comments:0 | Tags:Android Machine Learning Mobile Malware Mobile Security News

Zimperium and VMware Partner to Deliver Mobile Threat Data into VMware Workspace ONE Intelligence

As the global leader in mobile device and app security, Zimperium is excited to announce that we have joined the VMware Workspace ONE Trust Network. As part of this network, we will be leveraging VMware’s newly announced API to provide mobile threat data directly into VMware Workspace ONE Intelligence.    VMware Workspace ONE Trust Network The Workspace ONE
Publish At:2019-11-12 00:25 | Read:107 | Comments:0 | Tags:Mobile Security Mobile Threat Defense advanced mobile threat

It’s Beginning to Look a Lot Like Holiday Shopping: Secure Your Online Purchases

As we gear up to feast with family and friends this Thanksgiving, we also get our wallets ready for Black Friday and Cyber Monday. Black Friday and Cyber Monday have practically become holidays themselves, as each year they immediately shift our attention from turkey and pumpkin pie to holiday shopping. Let’s take a look at these two holidays, and how their
Publish At:2019-11-11 23:20 | Read:41 | Comments:0 | Tags:Consumer malware mobile security mobile cybersecurity

Do Americans Think Their Phone Is Listening To Them? (Survey)

Microphones on your devices were created to make life simpler. Not sure what song is playing on the radio? Ask Siri to listen and tell you what the artist is. Need to call your mom but you’re in the middle of cooking dinner? Ask Alexa to make the call for you. The mics in our devices allow us to go hands-free and multitask.  The problem with online microphon
Publish At:2019-11-11 22:35 | Read:6 | Comments:0 | Tags:Mobile Security Panda Security Security Technology cybersecu

Android smartphone owners fall victim to new ‘unremovable’ malware variant

No matter how destructive or invasive, Android malware can usually be removed from an infected device. But a new variant is causing problems for users. Known as xHelper, this new malware is causing a number of problems – not least the fact that it cannot be easily uninstalled. Normally deleting affected apps is enough to stop the infection, but not so with x
Publish At:2019-11-11 22:35 | Read:49 | Comments:0 | Tags:Malware Mobile News Mobile Security Android cybersecurity

Bug Hunters Hack Samsung Galaxy S10, Xiaomi Mi9 at Pwn2Own

Pwn2Own Tokyo 2019 has come to an end and on the second day of the hacking contest bug bounty hunters have earned a total of $120,000 for demonstrating exploits against Samsung Galaxy S10 and Xiaomi Mi9 phones and TP-Link AC1750 routers.Of the seven hacking attempts scheduled for day two, four were a complete success. Amat Cama and Richard Zhu of the Fluoroa
Publish At:2019-11-11 22:15 | Read:86 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Wireless Security Vulner

6 Tips to Spot Online Scams this Shopping Season, and 9 Ways to Stop them:

6 Tips to Spot Online Scams this Shopping Season, and 9 Ways to Stop them: November 7th, 2019 No Comments anti-phishing, Holidays, Mobile Security, Online Privacy, Online Safety, PC security Singles’ Day, or “Worlds Shopping Day”, marks the s
Publish At:2019-11-11 22:05 | Read:56 | Comments:0 | Tags:anti-phishing Holidays Mobile Security Online Privacy Online

Millions Download Adware-Carrying Apps From Google Play

Tens of adware-carrying Android applications gathered 8 million installs on Google Play before being taken down, ESET reports.The campaign, which started in July 2018, involved a total of 42 applications hosted on Google Play, 21 of which were still available in the storefront at the time of discovery. All of the offending apps have already been removed from
Publish At:2019-10-28 10:15 | Read:193 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Virus & Threats Viru

Click-Fraud Trojan Found in Apple App Store

A total of seventeen iOS applications infected with clicker Trojan malware made it into the Apple App Store, Wandera’s threat researchers have discovered.The infected applications, Wandera says, communicated with a known command and control (C&C) server to simulate user interactions. Thus, they allowed operators to fraudulently collect ad revenue.Just as
Publish At:2019-10-24 12:00 | Read:216 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Virus & Threats Viru

Protecting Your Mobile Devices with Workspace ONE and Zimperium MTD

In order to help organizations of all sizes proactively protect employees and data from mobile threats, Zimperium has partnered with the leading UEM (unified endpoint management) providers, including VMware’s Workspace ONE, to deliver sophisticated threat protection for mobile devices. We are able to detect threats and work with UEMs to remediate risks and
Publish At:2019-10-23 07:50 | Read:231 | Comments:0 | Tags:Mobile Security Mobile Threat Defense advanced mobile threat

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud