article thumbnail

How to Build a Mobile-First Security Strategy

Ivanti

Mobile devices have radically changed the way we work and collaborate. But along with the exponential growth in the use of smartphones and mobile apps has come a surge in vulnerabilities and exploits. That’s the financial impact of digital fraud stemming from mobile usage.

Mobile 45
article thumbnail

Hidden inside Dark Caracal’s espionage apps: Old tech

The Parallax

The digital-rights group Electronic Frontier Foundation and Lookout Mobile Security, which co-authored the report, say they tracked the Dark Caracal phishing campaign across more than 60 websites. “ If you had even a little mobile development experience, [Dark Caracal] could cost less than $1,000.”—Michael

Malware 170
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Future of Security

O'Reilly Media - Ideas

Mobile device securit y, which is becoming more urgent with an increase in remote work and mobile devices. However, as cloud computing increased, experts recognized that traditional strategies and solutions would not work in a mobile-first/hybrid world. Mobile Device Security.

Mobile 99
article thumbnail

9 Types of Phishing and Ransomware Attacks—And How to Identify Them

Ivanti

Once the end user’s credentials are known via phishing attack, cybercriminals can then grab additional valuable data on the user’s mobile device or laptop, then escape the device and move laterally onto connected networks in search of additional valuable data to steal. 2021 was a record-setting year for data breaches and ransomware.

article thumbnail

Radar trends to watch: August 2021

O'Reilly Media - Ideas

Checkov , a code analysis tool for detecting vulnerabilities in cloud infrastructure, can now can find these credentials in code. The attack apparently only affects on-premises infrastructure. Web and Mobile. A massive ransomware attack by the REvil cybercrime group exploited supply chain vulnerabilities.

Trends 138
article thumbnail

IT Security Threats That May be Lurking in Your Assets

Samanage

However, some assets can contain threats; worse yet, they can make your data center, other assets, and entire IT infrastructure vulnerable to a wide range of exterior threats. It can be hard to estimate the threat level posed by every cell phone and every other mobile security device that comes into contact with your network.

article thumbnail

Learn the Language of Vulnerability Assessment: Key Security Terms You Should Know

Tenable

computers, mobile devices or operational technology such as network switches and control systems). Spyware: Programs that monitor activity of infected computers (e.g., Cybersecurity and Infrastructure Security Agency, "Ransomware Guidance and Resources" Trojans: Malware disguised as programs or files a user needs.

Malware 89