Mobile payments are on the rise, but are they safe?

Credit to Author: Rajib Singha| Date: Mon, 30 Oct 2017 09:18:31 +0000

Several non-banking institutions have entered the market offering payment services and this has only boosted the consumer’s readiness to adopt digital payments; particularly, mobile payments. The following statistics easily paint the picture of the exponential growth of digital transactions in the country. Cashless payments in October 2016 increased 22% when…

The post Mobile payments are on the rise, but are they safe? appeared first on Quick Heal Technologies Security Blog | Latest computer security news, tips, and advice.

Read more

Android Ransomware Alert! DoubleLocker changes your phone’s PIN and encrypts your data

Credit to Author: Rajib Singha| Date: Fri, 27 Oct 2017 11:40:59 +0000

DoubleLocker is an Android ransomware the likes of which have never been seen before. The malware is designed to launch a two-pronged attack – it locks down the phone it infects and encrypts all files stored in the device. What is spreading DoubleLocker ransomware? The malware gets into a device…

The post Android Ransomware Alert! DoubleLocker changes your phone’s PIN and encrypts your data appeared first on Quick Heal Technologies Security Blog | Latest computer security news, tips, and advice.

Read more

Machine learning-based threat detection is coming to your smartphone

Credit to Author: Lucas Mearian| Date: Thu, 05 Oct 2017 07:33:00 -0700

Part of a growing trend, MobileIron announced today that it is adding machine learning-based threat-detection software to its enterprise mobility management (EMM) client, which it said will help address an increase in mobile attacks.

The Mountain View, Calif.-based company said it has partnered with Zimperium, a maker of machine learning-based behavioral analysis and threat detection software that monitors mobile devices for nefarious activity and apps.

MobileIron said it will integrate Zimperium’s z9 Engine software with its security and compliance client. The software will reside on users’ iOS or Android smartphones or tablets, and it will also become a part of IT administrators’ EMM control consoles. That upgrade to MobileIron’s EMM client will “automate the process of detecting and responding to mobile threats,” MobileIron stated.

To read this article in full or to leave a comment, please click here

Read more

Helping Mobile Operators Keep Customers Safe with Virtualized Network Security

Credit to Author: Trend Micro| Date: Wed, 27 Sep 2017 13:00:26 +0000

Recently, a frightening trend has emerged where cyber criminals poach the capabilities of legitimate message apps in order to carry out their malicious activities.At Trend Micro we’re always looking for innovative new ways to support our customers and help overcome their cybersecurity challenges. Mobile network operators (MNOs) are increasingly adopting virtualization and software acceleration technologies to become more agile in how they deploy and operate network services: for example, to help deal with large, unpredictable network volumes during…

Read more

An Established Solution for Mobile Threats

Credit to Author: Trend Micro| Date: Thu, 07 Sep 2017 13:00:45 +0000

Mobile vulnerabilities still threaten businesses in a number of ways.As much as smartphones and applications have evolved over the years, so has mobile malware. We’re seeing an increasing number of threats—from mobile ransomware and auto-clicking adware to dangerous backdoors that can compromise your privacy. And there are also legitimate personal applications that can be taken advantage of and used to target your enterprise. With…

Read more

Smartphones Under Fire: Why We Need to Keep Our Android Devices Safe

Credit to Author: Michael Miley| Date: Wed, 06 Sep 2017 13:00:13 +0000

If there’s one thing we know about cybercrimnals it’s that where there’s people and money, they will surely follow. With an estimated 1.4 billion Android devices in use today, it’s not hard to see why they might have your smartphone in their sights. Attacks on Android devices made up 81 percent of mobile attacks last…

Read more

It’s Back to School Time, So How Do I Keep My Child Safe Online?

Credit to Author: Michael Miley| Date: Tue, 29 Aug 2017 22:00:24 +0000

Keep non-tech people in your family safe from cyber threats.The end of the summer can be a pretty stressful time for parents as well as their kids. Apart from the prospect of a return to school, there’s a whole checklist of items to get ready. Schoolbag? Check. Sports kit? Check. Smartphone? Check. Internet safety guide? Errr… The truth is that today, there aren’t many…

Read more

Android 8.0 in-depth: Oreo's not-so-obvious security enhancements

Credit to Author: JR Raphael| Date: Tue, 29 Aug 2017 10:01:00 -0700

When you read about a splashy new software update like Google’s fresh-from-the-oven Android 8.0 Oreo release, you tend to hear mostly about the marquee features — the most attention-grabbing elements and refinements you’re likely to notice when you get the update on your own device.

It’s understandable, since those are the things we all see most immediately and directly. Beneath the surface, though, Oreo has some pretty significant stuff going on in the realm of security — stuff that hasn’t been widely covered but is as important as anything else to understand.

To read this article in full or to leave a comment, please click here

Read more