3 Steps on the Path to Mobile Security

3 Steps on the Path to Mobile Security

It really is the Wild West out there — as more device manufacturers pop off new smartphones and tablets, and as everyone and their brother creates new mobile apps, the number of mobile devices and apps are skyrocketing. There are around 2.5 billion smartphones users globally and almost 200 billion mobile app downloads per year. Smart cyber criminals are increasingly targeting enterprise mobile devices and apps to make money and cause trouble. Mobile devices are soft targets — they operate outside of the walls of the office and use public communications networks to conduct their business. Amazingly, 20% of companies believe that their company has already […] Read more

According to a MacAffee report, SMiShing(SMS phishing) has continued to grow in popularity as a social engineering tool for cybercriminals.

According to a MacAffee report, SMiShing(SMS phishing) has continued to grow in popularity as a social engineering tool for cybercriminals.

According to a MacAffee report, SMiShing(SMS phishing) has continued to grow in popularity as a social engineering tool for cybercriminals. What SMiShing does is that it tricks the user into clicking on a link in a text message; and that link goes to a page prompting the user to enter personal data. The objective is to gain access to sensitive information like usernames and passwords. On top of that, many SMiShing messages will include links with malware waiting on the other side for anyone who clicks on them.

This has implications, especially if employees are not well-informed on security threats that […] Read more