Asia's Source for Enterprise Network Knowledge

Saturday, March 23rd, 2019

Mobile Device Management

One in three organizations suffered data breaches due to mobile devices

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

New Verizon report shows a big gap between organizations' mobile security risk concerns and mobile security best practices they implement.

 

Galaxy S10 expected to use Qualcomm's fingerprint scanners

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

The Galaxy S10 is predicted to be Samsung’s first device with an in-display fingerprint reader

 

Mobile app management is being driven by unmanaged devices

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

The growth in unmanaged devices owned by employees or contractors is driving adoption of stand-alone mobile application management (MAM) software and services, according to a new report.

 

WD turns to single app portal to create 'mobile moments' for workers

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

After acquiring two multi-billion-dollar companies, Western Digital had a choice: continue using disparate methods for corporate application access or rip and replace it all with a single portal. It chose the latter.

 

Why we can’t trust smartphones anymore

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

A new class of security problem is caused by smartphone makers that create vulnerabilities deliberately without telling customers.

 

The best mobile threat defense is mobile threat detection

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

It’s time to add MTD to your Enterprise Mobile Management toolkit. Because it’s better to get ahead of mobile threats than it is to try and clean them up after you’ve been attacked.

 

An MDM enterprise app risk amid iOS security boosts

Mobility

Early this month, Check Point’s mobile research team presented details of a vulnerability, dubbed SideStepper, that allows an attacker to circumvent security enhancements in iOS 9 intended to make it harder for users to install a malicious enterprise app accidentally.

“As in any platform, iOS has its own vulnerabilities but most of them are really not exploitable so it’s hard to use the vulnerability to take over the mobile device,” says Ohad Bobrov, the mobile threat prevention area manager at Check Point. “So in truth, iOS is rather secure.”

Hackers can abuse the iOS mobile device management protocol to deliver malware

News

The attack bypasses the restrictions for enterprise app deployment introduced in iOS 9, Check Point researchers said

 

Securing mobile health records remains a significant challenge

News

Healthcare organizations are investing big into mobile medical records, but are they keeping them secure?

 

Half of U.S. businesses have no formal BYOD policy for security

News

Emergence of biometric smartphone security is rare, survey says