Essential Facebook security tips for iPhone users

Credit to Author: Jonny Evans| Date: Tue, 13 Mar 2018 05:05:00 -0700

The world of grey IT means both enterprise and consumer users frequently use popular social networking service Facebook on their devices. It makes sense, then, to stay safe while using it.

Manage Facebook Security settings

First things first: Always use a complex passcode with your account and do make sure to set up two-factor authentication.

Now that you’ve done that, you’ll find Facebook’s own privacy settings live inside Privacy Shortcuts in the iOS app. Get to these by tapping the three-line icon at bottom right of the Facebook app and scrolling down to Privacy Shortcuts. The first thing you should do is run Privacy check-up (at the top of the page). Facebook will guide you through your existing settings, change them for maximum privacy, and delete any Facebook apps you’ve forgotten about or no longer use.

To read this article in full, please click here

Read more

IT beware: University finds new 4G security holes

Credit to Author: Evan Schuman| Date: Mon, 12 Mar 2018 10:25:00 -0700

IT has enough to worry about with traditional data breach issues, but now researchers from Purdue University and the University of Iowa have found quite a few new security holes in the popular 4G mobile networks.

The potentially worst hole detailed in the study is an authentication synchronization failure attack. The danger? It allows bad guys to read incoming and outgoing messages from an employee, permits “stealthy denial” of selected services and “location of history poisoning,” which simply means it can manipulate location ready to give false information to systems using location for identity authentication.

To read this article in full, please click here

Read more

Feds move to secure mobile devices with machine learning, biometrics

Credit to Author: Lucas Mearian| Date: Tue, 06 Mar 2018 03:24:00 -0800

Amid the growing use of mobile devices for work by federal employees, U.S. defense and intelligence agencies are fast adopting biometrics and other alternative ways of  computers, smartphones and tablets, according to a new report.

More than 90% of federal agency IT officials in an online survey said their organizations provide secure mobile access for work-issued devices, but less than 20% support workers’ personal devices to access most agency systems. Forty percent of those same officials voiced concern about securing personal devices, according to the online survey of federal government IT and cybersecurity officials.

To read this article in full, please click here

Read more

Mobile Menace Monday: Olympics app has more ads than games

Credit to Author: Nathan Collier| Date: Mon, 05 Mar 2018 18:00:00 +0000

An app claiming to live stream the 2018 Winter Olympics had a short run on Google Play before being flagged for adware.

Categories:

Tags:

(Read more…)

The post Mobile Menace Monday: Olympics app has more ads than games appeared first on Malwarebytes Labs.

Read more

Kotlin-based malicious apps penetrate Google market

Credit to Author: Gleb Malygin| Date: Tue, 13 Feb 2018 16:00:00 +0000

New malicious apps appear in Google Play abusing Kotlin, the “safest” official programming language for the Android.

Categories:

Tags:

(Read more…)

The post Kotlin-based malicious apps penetrate Google market appeared first on Malwarebytes Labs.

Read more

Mobile app management is being driven by unmanaged devices

Credit to Author: Lucas Mearian| Date: Mon, 12 Feb 2018 03:08:00 -0800

The need to manage applications on unmanaged devices owned by employees or contractors is driving adoption of stand-alone mobile app management (MAM) software and services, according to a new Gartner report.

By 2021, 60% of mobile apps being used in the enterprise will rely on at least one app-level management control, whether on managed or unmanaged devices, Gartner’s Market Guide for Mobile Application Management said.

Unlike MAM tools that are part of a larger enterprise mobility management (EMM) suite, the use of stand-alone MAM licensing offers lower per-user cost and can be attractive for companies only requiring app management, Gartner said. For other firms, EMM provides the advantage of a single console and policy set.

To read this article in full, please click here

Read more

Bogus hack apps hack users back for cryptocash

Credit to Author: Nathan Collier| Date: Wed, 07 Feb 2018 19:30:00 +0000

Recently, we discovered a gold mine of fake hack apps that mine for Monero cryptocurrency and serve up annoying adware.

Categories:

Tags:

(Read more…)

The post Bogus hack apps hack users back for cryptocash appeared first on Malwarebytes Labs.

Read more