When Stalkerware Stalks the Enterprise

Fifty years ago, Cold War spy tradecraft required ingenious, purpose-built spy technologies. These included tiny cameras that photographed through button-holes

Read more

The Role of Evil Downloaders in the Android Mobile Malware Kill Chain

The spread of malware from user PCs to handheld devices such as smartphones has been a gradual process that started

Read more

Considering Container Security? 6 Ways to Make a Case for Containerization

DevOp’s value to the organization depends on speed; velocity is a critical success measure on the road to digital transformation.

Read more

Mobile Security Risks Are on the Rise, But Employers Continue to Cut Corners

Mobile devices have taken over the enterprise. Ninety-five percent of us own a cellphone, and a full 100 percent of

Read more

What Happens When Malware Sneaks Into Reputable Hardware, Applications and App Stores?

To avoid malware, you should always get hardware and software from official, authorized and reputable sources and vendors, right? But

Read more

Preparing for the Unpredictable: Security in a New World of Mobile Malware

Mobile malware is nothing new. But in recent months, attackers have been getting more creative and resourceful with how they

Read more