Mobile Security

Mobile Security

Diving into Summer Vacation Security Risks

Diving into Summer Vacation Security Risks

We are in the middle of the holiday season, and while it may be the most enjoyable part of the year, it’s definitely not the safest. We all take our technology gear ...
The Evolving Network Security Environment – Can You Protect Your Customers in a 5G Universe?

The Evolving Network Security Environment – Can You Protect Your Customers in a 5G Universe?

Smart Farming depends on internet of things (IoT) devices and sensors to monitor vast farm fields, guiding farmers’ decisions about crop management through rich data. But it only takes one security flaw ...
Remove Iphonesupport.net Scam

Remove Iphonesupport.net Scam

This article will help you remove Iphonesupport.net in full. Follow the tech support scam removal instructions provided at the end of this article. Iphonesupport.net is a website which is connected to a ...

A week in security (July 9 – July 15)

A roundup of the security news from July 9 - July 15, including sextortion, Spectre, cryptomining, mobile malware, ICO scams and more. Categories: Security world Week in security Tags: ad blockersandroid malwarecrypto ...
Video: Bug Hunting as a Second Income

Video: Bug Hunting as a Second Income

Video and Slide Deck from EH-Net Live! July 2018 When most think of selling bugs, they have visions of the underground hacking scene populated by nefarious characters using their 0-days for illegal ...
Facebook

The Shared Security Weekly Blaze – Polar Fitness App Location Data Exposed, Blocking Scam Phone Calls, Samba TV Privacy Controversy

This is the Shared Security Weekly Blaze for July 16th, 2018 sponsored by Security Perspectives – Your Source for Tailored Security Awareness Training and Assessment Solutions and Silent Pocket. This episode was ...
iPhone Users Under Highly Targeted Attack that Leverages MDM Protocol

iPhone Users Under Highly Targeted Attack that Leverages MDM Protocol

A highly targeted malware campaign targeting iPhone users in India has been unearthed by Cisco Talos security researchers. The campaign has been active since August 2015 and is spying on 13 specific ...

8 Reasons Mobile Apps Access Location + Security Policies to Consider

A fitness app, called Polar Flow, was recently found to be exposing the name, profile picture and whereabouts of high-ranking military personnel by oversharing user location data. Unfortunately, this is not the ...

USB restricted mode: now you don’t see it, now you do…

USB restricted mode broken already? Android devices with pre-installed malware; Apple and Google questioned over user tracking ...
Loading...