mobile security
Major Mobile Security Threats of 2019
As businesses are going mobile, data security seems to be a top precedence for most enterprise leaders in 2019. And that’s because securing information at every level has become a priority than just a necessity. So, Cybersecurity Insiders has outlined a list of major Mobile Security Threats of 2019 which might hinder the growth of […]
BlackBerry announces first AI-based Mobile Security Cloud Solution
Canadian Multinational Company BlackBerry Limited has announced the worlds first AI-powered Mobile Security cloud solution which leverages the power of adaptive security, continuous authentication, and Artificial Intelligence to enhance mobile endpoint security in ‘Zero’ trust environments. Dubbed as BlackBerry Intelligent Security, it’s a platform where contextual and behavioral factors are combined to form a unique […]
Fake FaceApp triggers Mobile Security fears
FaceApp which allows its users to transform their faces in their photographs is back in news for all wrong reasons. Security analysts from Kaspersky have discovered that a fake application with a similar name has managed to creep into the mobile app stores and is reported to be filled with an adware module called MobiDash. […]
Insecure data storage causing Mobile Security vulnerabilities
Security researchers argue that insecure storage on mobile phones is creating vulnerabilities to be exploited by hackers for accessing sensitive info from both Android and iOS apps. The study carried out by a security company named Positive Technologies says that 76% of mobile applications open up data to be accessed by hackers leaking out insightful […]
Mobile Security of US banking apps is not up to the mark
Research carried out by Zimperium, a mobile security firm from Texas says that most banking apps in the United States have security flaws exposing user data to hackers. This includes the apps downloaded on Android and iOS platform leading to cyber risks such as communication at risk, data leaks and flaws allowing hackers to spy […]
Follow these 3 mobile security measures to protect your Enterprise Networks
Following in-depth mobile security, the strategy can help protect your enterprise network from security, privacy, and compliance related cyber threats which often emerge from vulnerable mobile apps. It’s like strengthening the defense line against major threats which have the greatest potential impact and this simple move will help mitigate 80% of security risks. But here […]
Apple releases iOS 12.2 with bug fixes for over 50 mobile security issues
Apple Inc has addressed almost 50 mobile security issues with the release of its latest iOS 12.2 updates. And the fix is said to support various issues maligning the company Airpods (eavesdropping), Animoji, AirPlay 2 and the newly launched Apple News+. Security analysts of Apple suggest that the iPhone maker has also covered the critical […]
Mobile Security compromise is making companies vulnerable to data loss, downtime, and reputational damage
Companies who are willing to compromise on mobile security are found to be falling vulnerable to cyber risks such as data loss, downtime and reputational damage and customer relationship. This was revealed in a Mobile Security Index survey conducted by Verizon where over 48% of respondents agreed to have sacrificed mobile security in the past […]
Sophos integrates with Microsoft to offer utmost Mobile Security Threat Detection
British Security firm Sophos has announced that it will be integrating its Mobile Device Management system with Microsoft’s Intune to help customers work and access data in a secure way from any device and location while maintaining compliance with the corporate data laws. Therefore, Sophos Mobile Security running on Microsoft Azure will help IT admins […]
Six Mobile Security threats which need your attention
Every company is worried about mobile security these days as most of the employees of these firms are finding it comfortable to access corporate data from Smartphone’s, tablets and other personal devices. But accessing sensitive data on unsecured devices or devices which lack trust is pushing firms into more trouble as there is always a […]