Mobile Threat News Articles


IBM Security Intelligence Blog | BY Douglas Bonderud
Saturday | December 30, 2017

Sensor Shortfall: Mobile Application Security Could Put PINs at Risk

The ideal data that cybercriminals target to compromise mobile devices is user personal identification numbers (PINs). Now it’s possible for what devices see, hear and feel to help cybercriminals gain total device access.

Read More

Wired | BY Lily Hay Neuman
Friday | December 29, 2017

Cryptojacking Has Gotten Out of Control

As cryptojacking has spread around the web—largely thanks to the original “in-browser miner,” Coinhive, and its copycats—the technique is used to exploit unknowing people’s resources, both their hardware and electric bills, and it is increasingly blocked as malware by scanners…

Read More

Security Boulevard | BY Sean Cunningham
Thursday | December 28, 2017

How Enterprises Can Better Combat Advanced Cyber Attacks

Organizations must fight the ongoing prospect of cyber attacks like an army would fight a major war, learning from mistakes, experimenting with fresh tactics, and embracing an ongoing commitment to intelligence gathering.

Read More