Mobile Threats
This Caller Does Not Exist: Using AI to Conduct Vishing Attacks
The best way to defend against vishing attacks is by educating ourselves on how threat actors operate, and to become familiar with the tools, techniques and procedures used to carry out these ...
Security Boulevard
How NinjaOne’s New MDM Capabilities Transform IT Management
IT security teams are tasked with protecting an increasingly mobile work environment—managing a myriad of devices efficiently and securely. Addressing this need, NinjaOne has launched its new Mobile Device Management (MDM) capabilities, ...
Hackers Leverage AI as Application Security Threats Mount
Nathan Eddy | | AI, API security, application monitoring, Fintech, gaming, low-code, Mobile Phishing, Mobile Threats
Reverse-engineering tools, rising jailbreaking activities, and the surging use of AI and ML to enhance malware development were among the worrying trends in a recent report. AI and ML are making life ...
Security Boulevard
Lisa Plaggemier Discusses Cybersecurity at the Winter Olympics
Tony Bradley | | Cyber Espionage, drive-by downloads, Malware, Mobile Threats, NCSA, spyware, winter olympics
TechSpective Podcast Episode 085 The Winter Olympics are taking place right now in Beijing, China. It puts the teams and athletes in a sensitive and precarious situation because China is an economic ...
Debunking Wi-Fi® Security Myths
Tony Bradley | | broadband, Mobile Threats, Security Awareness, Wi-Fi, Wi-Fi 6, Wi-Fi Hostpot, wi-fi security
Wireless networking has fundamentally changed the way people access information and get things done. It allows devices to connect natively to the network and access resources from almost any device and without ...
Best VPN Services for Android Users
If you want to access censored content or keep others from seeing your browsing history on public Wi-Fi, you need a good Virtual Private Network, or VPN. A VPN connects your computer—or ...
WhatsApp Vulnerability Illustrates Importance of Data Protection
Tony Bradley | | Data Loss Protection, data protection, Employee Risk, Mobile Threats, WhatsApp vulnerability
Technology provides a wide variety of benefits, but many come with caveats or pitfalls as well. When it comes to communication, technology enables us to engage with just about anyone, anywhere in ...
BlackBerry Moves to Strengthen Ties with the US Government (Thank God)
Rob Enderle | | blackberry, data protection, encryption, Mobile Threats, Security Awareness, US government
BlackBerry has successfully transitioned from being a smartphone vendor to something very different. They still have the leading operating system for automobiles and nuclear power plants (QNX), which is arguably (and has ...
BlackBerry Massively Steps Up Security Efforts to Address Threat Storm
BlackBerry continues to execute on their pivot to become a software, services, and device security firm. This doesn’t mean they don’t still have interesting smartphones, their licensed Key2 phone is arguably one ...
Risky Mobile Apps No Fun for Entertainment Sector
In case it’s not already on your risk radar, it’s time to add mobile apps to the growing list of threat vectors. Mobile apps are risky across all sectors, but more specifically, ...
Security Boulevard