What is the CIA Triad: Confidentiality, Integrity, & Availability

What is the CIA Triad: Confidentiality, Integrity, & Availability

Visibility & Control: The keys to the kingdom of information security and network function integrity Ask any security practitioner how to start designing network infrastructure for security and they will tell you ...
A quick update on 2019 mobile predictions made in January.

A quick update on 2019 mobile predictions made in January.

So far this year, the surreptitious capture of audio and visual data via smartphone cameras and microphones has negatively impacted the world’s richest person and a beloved trillion-dollar company. It’s safe to ...
How Apple Shapes the Narrative About Smartphone Security

How Apple Shapes the Narrative About Smartphone Security

In August, we conducted our annual survey designed to gauge attitudes about mobile security and privacy. In looking behind this year’s numbers, I was struck by how shifting perspectives seem to mirror ...
Cybercrime – When Consumers Feel Like Victims, Operators Come to The Rescue

Cybercrime – When Consumers Feel Like Victims, Operators Come to The Rescue

Yes, it’s unfortunate, but it’s often been said that there are two types of cybercrime victims – those who have fallen prey to the wily ways of cyber criminals, and those who ...
BSides London 2019

Security BSides London 2019, Sarah Kingham’s ‘A Newbie’s Talk On Mobile Dangers Through The Looking Glass’

Many thanks to Security BSides London for publishing their outstanding conference videos on YouTube. Permalink ...
13.jpg

Krebs On Security: Brilliant Exposé Of US Wireless Carriers

Fellow member of the Security Bloggers Network - Brian Krebs and his superlative blog Krebs On Security provides a tour de force exposé of the unfortunate current security posture of the wireless ...
mobile app

Is Your Smartphone App at Risk of Infecting Users?

The time to bring in security during the application development process should not be right before launch We live in a world of threats. They’re all around us in the real world, ...
Security Boulevard
Thinking Like a Smartphone Eavesdropper

Thinking Like a Smartphone Eavesdropper

Think of the last time you received a sensitive piece of information. Perhaps it was news of a highly anticipated project at work finally getting the green light, or maybe a not-for-public-consumption ...
mobile

Report Details Nature of Threats to Mobile Computing

A report published today by CrowdStrike, a provider of endpoint protection software and services, finds that attacks aimed specifically at mobile computing devices are increasing in both frequency and sophistication. As end ...
Security Boulevard
Lawmakers’ Smartphones and the Battle of Information

Lawmakers’ Smartphones and the Battle of Information

There's a war out there, old friend. A world war. And it's not about who's got the most bullets. It's about who controls the information. What we see and hear, how we ...
Loading...