Endpoint November 13, 2018 How to Stop Mobile Apps That Steal 4 min read - One of the best ways for cybercriminals to deliver a payload on your organization's network is to smuggle it inside your employees' mobile apps.
October 23, 2018 GPlayed Android Trojan Imitates Google Apps to Spy On and Steal Data From Victims 2 min read - Researchers uncovered an adaptable Android Trojan known as GPlayed that masquerades as Google Apps to spy on and steal information from victims.
June 1, 2016 ‘Perfect’ Data Exfiltration Demonstrated 2 min read - Covert data exfiltration techniques can be perfected with the help of 10 commandments, which were recently laid out by researchers.
September 2, 2015 Getting Out: Data Exfiltration Gets Sophisticated 2 min read - Data exfiltration techniques are getting more sophisticated. How do companies protect their interests against attackers who are willing to get creative?
Software Vulnerabilities August 5, 2014 Apache Cordova Vulnerability Discovered: 10% of Android Banking Apps Potentially Vulnerable 8 min read - The IBM Security X-Force Research team has uncovered a serious vulnerability that affects many Android applications built on the Apache Cordova platform.
Malware October 24, 2013 Protecting POS Systems From Dexter and Other Advanced Malware < 1 min read - Maintaining the security of POS systems is a growing concern: The Dexter malware has been found to target customers' payment information.