How mobile threats impact today’s BYOD landscape

Credit to Author: Trend Micro| Date: Mon, 23 Jul 2018 18:56:36 +0000

Bring-your-own-device (BYOD) has been a revolutionary concept for years now, even before it was recognized by enterprise policy. However, now that business executives and IT leaders have realized the benefits this type of strategy for their organizations, BYOD is becoming an increasingly powerful way to support efficient access and productivity. At the same time, however,…

The post How mobile threats impact today’s BYOD landscape appeared first on .

Read more

BlackBerry's Android upgrade track record should give anyone pause

Credit to Author: JR Raphael| Date: Thu, 28 Jun 2018 08:56:00 -0700

Hey, look: A new BlackBerry phone is here! And no, you didn’t just wake up from a 12-year coma. I promise you, it is still 2018.

The new BlackBerry Key2, however, is aimed squarely at those who miss the glory days of the physical-keyboard-packin’ phone — specifically, business users who still place some sort of value on the BlackBerry name (even if it’s technically a different organization making the devices now). The company’s own landing page for the device placards that focus plainly:

To read this article in full, please click here

Read more

Don’t be a Coinmining Zombie – Part 2: How Do You Protect Yourself from being Cryptojacked?

Credit to Author: Trend Micro| Date: Thu, 14 Jun 2018 13:04:32 +0000

Safe behaviors to protect yourself from cryptojacking follow the familiar rules you should adhere to every day to protect yourself against viruses, worms, bots, and malware, including ransomware, which are typically pushed to you through phishing techniques and social engineering:     Strengthen your network device’s credentials (e.g., your router), to make it less open…

The post Don’t be a Coinmining Zombie – Part 2: How Do You Protect Yourself from being Cryptojacked? appeared first on .

Read more

Don’t Be a Coinmining Zombie – Part 1: Getting Cryptojacked

Credit to Author: Trend Micro| Date: Mon, 11 Jun 2018 13:00:39 +0000

When your computer or mobile device (and now, even your IoT device) is hijacked to secretly mine cryptocurrencies, it’s been cryptojacked and becomes a coinmining zombie. Its CPU, memory, disk, and power are enlisted in varying degrees in the service of the mining botnet, which labors on behalf of those who use it, with other…

The post Don’t Be a Coinmining Zombie – Part 1: Getting Cryptojacked appeared first on .

Read more

[INFOGRAPHIC] 5 Myths about mobile security and facts that debunk them

Credit to Author: Rajiv Singha| Date: Thu, 31 May 2018 08:45:31 +0000

When it comes to desktop computers, people go for the best security software. But when the talk is about their mobile security, odds are, they are least bothered. Most think that their mobile devices are less vulnerable to cyberattacks than their computers; that however, is a myth, and probably a…

Read more

The New Mobile Threat Landscape, circa 2017 to 2018

Credit to Author: Trend Micro| Date: Thu, 26 Apr 2018 13:00:10 +0000

Is your phone infected?

Submitted by Ian Grutze If mobile threats diversified and expanded in 2016, they matured in 2017. Mobile ransomware continued to rear its head, burgeoning into the platform’s most prevalent threat. Simple screen lockers, for instance, evolved into file-encrypting malware, some of which even seemed to keep pace with their desktop counterparts in terms of malicious routines….

The post The New Mobile Threat Landscape, circa 2017 to 2018 appeared first on .

Read more

The best privacy and security apps for Android

Credit to Author: JR Raphael| Date: Tue, 24 Apr 2018 03:00:00 -0700

Let’s get one thing out of the way right off the bat: If you’re looking for recommendations about Android security suites or other malware-scanning software, you’ve come to the wrong place.

Why? Because, like most people who closely study Android, I don’t recommend using those types of apps at all. Android malware isn’t the massive real-world threat it’s frequently made out to be, and Google Play Protect and other native Android features are more than enough to keep most devices safe.

To read this article in full, please click here

Read more