Should governments regulate social media data collection?

Venafi announced the results of a survey querying 512 security professionals attending RSA Conference 2018. The survey evaluated opinions on the intersection of cyber security, privacy threats and government regulation. According to the survey, 70 percent of respondents say governments should regulate the collection of personal data by social media companies to protect user privacy. However,…

No Rest for the Weary: Mobile Hackers are Getting More Aggressive

Another year, another increase in the number of mobile threats, vulnerabilities, and outdated mobile devices. So, what gives? If the headlines have you thinking that mobile security is getting worse, you’re not imagining things. We have just published the quarterly Mobile Threat Intelligence Report to dig into the 2017 numbers a bit.  The report is based on…

Investors concerned about smartphone addiction; Apple responds with new webpage

Hot on the heels of an open letter from investors urging Apple to do more to protect children from smartphone addiction, the tech giant has recently dedicated a page on their website to families. The “Families” page, which can be accessed at apple.com/families, contains tools parents can use to set restrictions on devices accessible to their kids, manage…

Samsung Smartphones Get Encrypted Communications

KoolSpan this week announced a partnership with Samsung to implement secure communications on Samsung smartphones. KoolSpan, a provider of encrypted secure voice and messaging solutions for mobiles, is already offering secure communications to enterprises. With support for mainstream phones, which are normally used within organizations, the solutions bring end-to-end encryption to all internal calls and…

The future of smartphone security: Hardware isolation

Mobile spyware has become increasingly more ubiquitous in corporate networks and devices. In a 2017 study, Check Point has found that out of the 850 organizations that they queried, 100% had experienced a mobile malware attack at least once in the past. To date, most cybersecurity companies have focused either on software-only or built-in hardware…

Can Biometrics Solve the Authentication Problem?

When Apple introduced the Touch ID fingerprint access button, commentators believed it would kick-start the ever-promising, never-quite-delivering biometric market. But Touch ID was defeated by hackers within days. When Apple introduced the FaceID biometric, the same happened – it was defeated within weeks. In November 2017, F-Secure demonstrated that Android’s Trusted Face Smart Lock can be defeated by…

Android’s December 2017 Patches Resolve Critical Flaws

The December 2017 Android security patches that Google released this week resolve 47 vulnerabilities, including 10 rated Critical severity. The patches affect a variety of platform components and were split in two packages, or security patch levels, as Google calls them. The first addresses 19 vulnerabilities while the second resolves 28 issues.