It’s been almost a year since what some analysts consider the first successful major threat to mobile banking, known as Svpeng, hit the United States. Spreading via a text message campaign, the Svpeng malware went after Android phones. While Svpeng didn’t steal mobile banking credentials, it did detect the presence of certain mobile banking apps and then locked those phones for ransom.[...]
Showing posts with label Mobile. Show all posts
Showing posts with label Mobile. Show all posts
Thursday, May 28, 2015
Mobile Banking Security Concerns on the Rise for Financial Institutions
It’s been almost a year since what some analysts consider the first successful major threat to mobile banking, known as Svpeng, hit the United States. Spreading via a text message campaign, the Svpeng malware went after Android phones. While Svpeng didn’t steal mobile banking credentials, it did detect the presence of certain mobile banking apps and then locked those phones for ransom.[...]
Saturday, July 5, 2014
Mobile ADVERTISING
Why mobile advertising isn’t as huge as it’s hyped to be (yet)
Christof Wittig is founder and CEO at LiquidM, a white-labeled Mobile Advertising Management Platform (MAMP). Mobile is huge, tech pundits say. But most of them miss the fact that mobile advertising isn’t growing anywhere near the pace of mobile adoption. As Mary Meeker’s 2014 Internet Trends Report shows, mobile ads still represent just a fraction of the global Internet advertising spend, which is still dominated by desktop-based ads. And if mobile content can’t make enough money through advertising, mobile is largely unsustainable as a media platform. This is a big problem for the industry, and while analysts like Meeker do a...
This story continues at The Next Web.
This story continues at The Next Web.
Sunday, June 29, 2014
DATA Security
Beyond prisonware: Smart data access for mobile and PC users alike.
Here's a radical idea: Monitor what users do with corporate data, rather than keep them from using it.
Credit: Oleksiy Mark
What good is access to corporate data if you can't actually work on it? That's a question I pose to mobile security vendors several times a month as they pitch the same bad idea over and over again: systems that provide read-only access to corporate data to make sure it's not abused. Never mind the data can't be used, either. Seriously, why bother? Tell them...
Subscribe to:
Posts (Atom)
LinkedIn users targeted by hacking group
LinkedIn users targeted by hacking group with fake job offers https://t.co/mPKKLqzF5k via @SiliconANGLE
-
Python skills are incredibly useful for all kinds of information security personnel, from pen testers to cyber defenders to forensics pros...
-
The non-profit organization behind TOR – the largest online anonymity network that allows people to ...
-
Flaw Puts a Billion Wireless Mice at Risk . Wireless mice and keyboards are the perfect accessories for a world in which devices increasing...