More News

Mobile Trojans steal Android users’ money through WAP-billing services

Kaspersky Lab researchers have discovered an unusual rise in mobile Trojan clickers that are stealing money from Android users through WAP billing – a type of direct mobile payment taken without any additional r...

Fluctuation in the exploit kit market – temporary blip or long-term trend?

Article by Rick Holland, Vice President, Strategy, Digital Shadows Exploit kit activity is waning. Collectively these malware distribution tools used to be a prominent method of infection. They rely on compromised...

Go back to the classroom to get ROI out of mobile security tools

Employees are placing a spanner in the works for companies implementing enterprise mobile device management (MDM) solutions to manage IT security risks, specifically in a bring your own device environment. They haven’t b...

ROPEMAKER: email security weakness – vulnerability or application misuse?

Article by Matthew Gardiner, Senior Product Marketing Manager, Mimecast Most people live under the assumption that email is immutable once delivered, like a physical letter. A new email exploit, dubbed ROPEMAKER by...

New version of Faketoken Android trojan hunts for taxi and ride-sharing app...

Kaspersky Lab researchers have discovered a new modification of the well-known mobile banking Trojan Faketoken, which has been developed and is now able to steal credentials from popular taxi applications. The mobile...

Best practices for Privileged Access Management

Article by: John Hathaway, Regional Sales Director, Middle East, BeyondTrust Privileged password management, sometimes called enterprise password management, refers to the practice and technique of securely...

Browse our latest issue

Intelligent CISO

View Magazine Archive