Mobile Security
5 Reasons Why Mobile Application Security Fails
Traditionally, large organizations and the enterprise have been the focus for hackers and malicious attacks, but in recent years, the rise of sophisticated hacking tools and leaked databases on the dark web, ...
Security Boulevard
Is Telco Cybersecurity the New Competitive Edge for Service Providers?
Moshe Moran | | Allot Secure, Communication Service Provider, csp, CSPs, cyber defense, Cyber Security, Mobile, Network Security, Security as a Service, Service Providers, telcom, Telecom
In my 20+ years working for and with telecommunication providers around the world, I’ve witnessed firsthand how the industry has evolved to offer continuously improved services to a wide audience of consumers ...
BleedingTooth: Intel Discloses Early, Angering Linux Lovers
A Google researcher discovered a high-severity vulnerability in the Linux Bluetooth stack ...
Security Boulevard
Moving to the Edge — An Outlook Into a New Era of Computing
Lelah Manz | | akamaiintelligentedge, cloud computing, edge computing, edgecomputing, edgeworkers, Mobile Experience, Mobile Performance, serverless, Web Performance
At the end of a busy week of Akamai platform updates, edge computing rises as a critical focus. Akamai has been operating services at the edge for over 20 years, from content ...
Xplora Watches for Kids: Chinese Spyware
Richi Jennings | | child online privacy, china, Privacy, Qihoo 360, SB Blogwatch, smartwatch, Xplora
Chinese smartwatches for kids: Just one of this decade’s objectively terrible ideas ...
Security Boulevard
How important is cybersecurity to mobile subscribers?
Ian Parkes | | Communication Service Provider, csp, CSPs, cyber attacks, cyber defense, Cyber Security, Cyber-attack, cybercrime, cybercriminals, Cybersecurity, cyberthreats, Internet of things, internet security, iot, Malware, Mobile, Network Security, security, Security as a Service, Service Providers, telcom, Telecom, Traffic Management
(This is a guest post by Ian Parkes, director at Coleman Parkes Research, a full-service, UK-based, end-to-end B2B market research company covering international telecom and a wide range of other industries.) My ...
Bitglass Leads the Pack in KuppingerCole’s CASB Market Compass
Jacob Serpa | | aws, Breach, CASB, Cloud Data Protection, Cloud Security, data leakage, healthcare, Malware, Mobile Security, Ransomware, SaaS
Bitglass was just recognised in KuppingerCole’s Market Compass for Cloud Access Security Brokers. For modern organisations, CASBs are go-to solutions that are designed to secure the use of cloud-based resources like software-as-a-service ...
Google Gives Cops Your Search Terms – Let the Frog-Boiling Commence
Richi Jennings | | 4th Amendment, Fourth Amendment, google, law enforcement, Privacy, SB Blogwatch, search warrant
Google stands accused of agreeing to overly-broad search warrants, which might violate the Fourth Amendment ...
Security Boulevard
Android Locker Variant Uses Innovative Sequence to Load Ransom Note
A new variant of a sophisticated Android locker family used an innovative sequence to load its ransom note on infected devices. On October 8, Microsoft Defender Research Team revealed that it had ...
Bitglass Security Spotlight: Ransomware Attack Affects more than 320K Students in Nevada School District
Juan Lugo | | aws, Breach, Cloud Data Protection, Cloud Security, dark web, data leakage, healthcare, Malware, Mobile Security, pii, Ransomware
Here are the top stories of recent weeks: Largest School District Data Breach Since COVID-19 (Affecting 320K Students) Cloud Software Giant Confirms Hackers Gained Access to Banking Information One of the Largest ...

