We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:



Recent Podcasts


\ Blog\ Mobility


October 15, 2017 | Mobile Access and Device Management
By Kevin Beaver, IANS Faculty

 Beaver: Learning the Right Lessons from ExpensiveWall Android Malware

If you're in charge of information security, you may not be able to control every user and every device in your environment, but you can shore up the gaps that do exist right now. If a security incident still surfaces, at least you’ll know in good conscience that you’ve done what needed to be done in order to minimize its impact.

Read More »

July 21, 2017 | Mobile Access and Device Management
By Ken Van Wyk, IANS Faculty

 Van Wyk: Security Track Record for iPhone Not an Accident

It’s not just luck. Apple has managed to keep the iPhone (and its iOS brethren) safe from any major malware outbreak for 10 years. Building a multi-faceted security architecture that substantially raises the cost of successful attacks can be extremely effective. 

Read More »

March 6, 2017 | Threat Intelligence and Modeling
By Chris Poulin, IANS Faculty

 Poulin: Breaking Down RSA and the Past, Present and Future of Information Security

Whether you look forward to or dread the RSA conference each year, it's practically a must-attend event for everyone who’s anyone in information security. And after a week of confusing my fitness wearable by clocking more than 15,000 steps per day, I’m left with the impression that we’re making progress in information security.

Read More »

July 11, 2016 | Malware and Advanced Threats
By Daniel Maloof, IANS Managing Editor

 Pokémon, No? Wildly Popular Mobile Game Could Be a Security Nightmare

No matter how hard you’ve tried (and I’ve tried really, really hard), it’s been impossible to ignore the excitement around Pokémon Go, Niantic Labs’ recently released augmented reality mobile game. Even if you’ve boycotted social media for the past week, someone attempting to collect a PokéBall has undoubtedly walked right into you on the sidewalk. It’s everywhere.

Read More »

April 2, 2016 | Mobile Access and Device Management
By Dave Shackleford, IANS Faculty

 Check Point Ponies Up $80 Million to Buy Mobile Security Firm Lacoon

ZDNet reports neither Check Point nor Lacoon would confirm the purchase price but Check Point is planning to fold Lacoon into its portfolio of traditional security products. Lacoon uses the cloud to evaluate behavior on mobile devices (both Android and iOS), and it compares the behavior to other reports and the Lacoon database of threats to help the system detect and identify zero-day attacks, malicious apps, botnets, rootkits and more. If a problem is detected, it can enable a VPN or institute new rules to prevent infected users from connecting to the enterprise network. Lacoon was founded in 2011 by veterans of the Israeli Army’s 8200 intelligence defense corps.

Read More »

September 21, 2015 | Malware and Advanced Threats
By Aaron Turner, IANS Faculty

 Apple App Store Hit With First Major Malware Attack

The New York Times reports that hackers were able to copy and modify the Xcode, which is Apple’s software development kit used to develop apps in the App Store. Researchers with Palo Alto Networks say that, thus far, approximately 40 apps with the malicious code have been found in the App Store, including a number of the most popular apps in China, such as WeChat, which has 500 million users. In an emailed statement, Apple told Reuters that it had “removed the apps from the App Store that we know have been created with this counterfeit software,’ and added that it is working with the developers of those apps to rebuild them.

Read More »