Application Security November 28, 2017 How Israel Became the Land of Connected Car Research and Development 2 min read - With its many manufacturer-sponsored test labs, smart car startups and military imperatives, Israel is becoming a major hub for connected car research.
November 13, 2017 Toast Overlay Attacks Prompt Malware Removal for Android Users 2 min read - An overlay attack involving Android's Toast feature may mean users have to deal with malware removal issues.
Endpoint November 9, 2017 Making the Case for Containment With WIP 3 min read - When integrated with a UEM solution by default, Windows Information Protection (WIP) acts as its own container and maintains a native user experience.
Banking & Finance November 7, 2017 The Power of Embracing Change: Why Mobile Payments Are More Secure Than You Think 5 min read - Although mobile payments are more convenient and arguably more secure than carrying physical credit cards, both retailers and consumers remain wary.
Intelligence & Analytics October 27, 2017 Investigating IoT Crime in the Age of Connected Devices 3 min read - To fight IoT crime, security professionals must properly classify incidents and connect seemingly disparate strings of evidence.
Endpoint October 23, 2017 Enterprise Mobility Management Even the Apprentice Can Control 3 min read - To secure a full-time position at the end of his internship, the Apprentice must design an effective enterprise mobility management strategy.
Endpoint October 13, 2017 Is My Fitness Band Protected? An Exercise in IoT Security 3 min read - Connected devices such as fitness bands hold the potential to revolutionize daily life, but they also pose IoT security risks.
October 5, 2017 IoT Security Has a Growing Effect on Public Key Infrastructure, Survey Says 2 min read - According to a recent survey by the Ponemon Institute, IoT security needs will drive increased use of public key infrastructure over the next two years.
October 3, 2017 Piecemeal Protection? Automatic Apple Firmware Updates Incomplete 2 min read - Incomplete updates to Apple firmware are putting users at risk of total device compromise, according to new security data.
September 28, 2017 Mobile Stock Trading Apps Vulnerable to Attack 2 min read - Over 20 mobile apps commonly used for stock trading are not very secure, according to recent security research.