Newspaper Icon with News Title - Red Arrow on a Grey Background. Mass Media Concept.

Bitglass Security Spotlight: Over 15 Billion Usernames and Passwords Are Now Available on the Dark Web

Here are the top stories of recent weeks: Bank Details to Streaming Services, It Is All Available on the Dark Web North Korea Is Linked to a Recent Cyberattack on US Enterprises ...
iPhone Hacks: What You Need to Know About Mobile Security

iPhone Hacks: What You Need to Know About Mobile Security

Guest Post by Jennifer BellLearn How Hackers Steal and Exploit Information to Ensure This Doesn’t Happen to You Cybersecurity is an important topic to know and understand in order to keep your ...
Business woman working on tablet with secured cloud technology and network concept

SmartEdge is a Key Enabler for a Modern Remote Workforce

To fully protect enterprise data, security teams have to balance two principle security threats: those coming from inside the organization, such as employees managing sensitive data, and those originating from malicious external ...

Going Beyond Awareness Training to Protect Mobile Devices from Phishing

According to the 2020 Verizon Mobile Security Index report, 85 percent of attacks seen on mobile devices took place outside of email. They break down these phishing attack vectors in this way: ...
Newspaper Icon with News Title - Red Arrow on a Grey Background. Mass Media Concept.

Bitglass Security Spotlight: Telehealth Startup Based in the United Kingdom Affected by Data Leak

Here are the top stories of recent weeks: AI Chatbot Startup Based in the United Kingdom Facing Backlash After Data Leak Nintendo Breach Shuts Down Portal and Affects Over 300k Accounts Ransomware ...

Lack of emphasis on secure teleworking is a national security risk.

Commercial mobile devices without proper protections are creating risks to our National Security ...
Security Threats Facing Modern Mobile Apps

Security Threats Facing Modern Mobile Apps

We use mobile apps every day from a number of different developers, but do we ever stop to think about how much thought and effort went into the security of these apps?It ...
Security Magazine IMSI Catchers _Blog Image

The spies in our cell networks

CEO walks out of nondescript office building accompanied by COLLEAGUE. CEO pulls smartphone out of her purse to study a restaurant’s website. Her smartphone’s status bar blinks briefly to indicate a change ...
SIM swap

SIM Swap Crypto Lawsuit Goes Forward in Los Angeles

Can AT&T be held liable for identity theft resulting from SIM swapping? In June 2017, Michael Terpin, a prominent cryptocurrency trader from Puerto Rico, turned on his cell phone and found it ...
Security Boulevard
The Top 3 Mobile Security Threats & How to Combat Them

The Top 3 Mobile Security Threats & How to Combat Them

(written with Aaron Martin Olivares and Dan Bloom) One of the most interesting things from my perspective at Allot is the view we have of the industry. Over the last month, 3 ...