Mobile Security Archives - Mobile Marketing Watch https://mobilemarketingwatch.com/mobile-marketing/mobile-technology/mobile-security/ Thu, 15 Jun 2017 09:15:18 +0000 en-US hourly 1 https://mobilemarketingwatch.com/wp-content/uploads/2023/10/cropped-MMW_LOGO__3_-removebg-preview-32x32.png Mobile Security Archives - Mobile Marketing Watch https://mobilemarketingwatch.com/mobile-marketing/mobile-technology/mobile-security/ 32 32 RiskIQ’s Digital Threat Management Platform Scores Top Recognition https://mobilemarketingwatch.com/riskiqs-digital-threat-management-platform-scores-top-recognition/ Thu, 15 Jun 2017 09:15:18 +0000 http://mobilemarketingwatch.com/?p=72128 RiskIQ, a prominent leader in digital threat management, announced Wednesday that it has been named Grand Prize Winner in the Security Product category of Interop’s Best of Show awards. The Best of Show awards, judged at this year’s Interop Tokyo, recognize exhibitors who “demonstrate significant innovation and technological advancements in their respective categories.” According to...

The post RiskIQ’s Digital Threat Management Platform Scores Top Recognition appeared first on Mobile Marketing Watch.

]]>
RiskIQ, a prominent leader in digital threat management, announced Wednesday that it has been named Grand Prize Winner in the Security Product category of Interop’s Best of Show awards.

The Best of Show awards, judged at this year’s Interop Tokyo, recognize exhibitors who “demonstrate significant innovation and technological advancements in their respective categories.”

According to a company briefing provided to MMW, business reliance on digital channels to engage with users presents a broad attack surface to obtain sensitive information, gain access credentials, and propagate malware.

“Through its regional distribution partner Macnica Networks, RiskIQ is rapidly expanding its customer base in Japan and Asia-Pacific, helping organizations protect their digital presence from exploits that originate from outside the firewall,” the RiskIQ crew tells us.

In short, the Digital Threat Management Platform and application suite provide unified visibility and control for enterprises, ensuring that their public-facing web, social, and mobile digital assets are continuously monitored and kept safe from unsanctioned use, impersonation, and abuse by malicious threat actors.

“Enterprises are looking to solution vendors such as RiskIQ to help them account for and protect their digital assets, many of which sit outside the corporate network and beyond the protection offered by traditional security solutions,” said Jenna Raby, vice president of APAC at RiskIQ. “We are very honored to receive this award and would like to recognize the dedication and technical excellence of our Japanese distributor, Macnica Networks, in helping us grow within the region and support our mutual customers.”

The post RiskIQ’s Digital Threat Management Platform Scores Top Recognition appeared first on Mobile Marketing Watch.

]]>
SafeMobile Cybersecurity Suite Headed for Mobile World Congress 2016 https://mobilemarketingwatch.com/safemobile-cybersecurity-suite-headed-for-mobile-world-congress-2016/ Thu, 11 Feb 2016 10:02:15 +0000 http://mobilemarketingwatch.com/?p=65225 SuperCom, a global provider of secured solutions for e-Government, Public Safety, HealthCare, and Finance sectors, announced this week that it will introduce its SafeMobile Cybersecurity Suite at the Mobile World Congress on February 22nd – 25th in Barcelona. If you’re planning to be on hand at MWC, SuperCom’s booth will be located in Hall 5...

The post SafeMobile Cybersecurity Suite Headed for Mobile World Congress 2016 appeared first on Mobile Marketing Watch.

]]>
SafeMobile Cybersecurity Suite Headed for Mobile World Congress 2016SuperCom, a global provider of secured solutions for e-Government, Public Safety, HealthCare, and Finance sectors, announced this week that it will introduce its SafeMobile Cybersecurity Suite at the Mobile World Congress on February 22nd – 25th in Barcelona.

If you’re planning to be on hand at MWC, SuperCom’s booth will be located in Hall 5 at Stand 5E81.

SafeMobile is designed to protect both common application attacks and, in parallel, application business logic. The solution offers comprehensive security on the client application on the mobile phone as well as on the backend server infrastructure.

“SafeMobile has been deployed to protect SuperCom’s Mobile payments suite and was recently invited to pilot with a large European enterprise, and it has also been invited by additional organizations, including commercial banks, to pilot and evaluate new protection strategies for their sensitive mobile applications,” a statement provided to MMW reads.

The post SafeMobile Cybersecurity Suite Headed for Mobile World Congress 2016 appeared first on Mobile Marketing Watch.

]]>
Online Trust Alliance Exposes How Rash of Ransomware Could Have Been Avoided https://mobilemarketingwatch.com/online-trust-alliance-exposes-how-rash-of-ransomware-could-have-been-avoided/ Wed, 27 Jan 2016 10:50:39 +0000 http://mobilemarketingwatch.com/?p=64914 The Online Trust Alliance (OTA) has just released its 2016 Data Protection and Breach Readiness Guide. This week, the non-profit organization with the mission “to enhance online trust,” shared the report’s findings with MMW. The guide, in a nutshell, provides prescriptive advice to help businesses optimize online privacy and security practices, and detect, contain and...

The post Online Trust Alliance Exposes How Rash of Ransomware Could Have Been Avoided appeared first on Mobile Marketing Watch.

]]>
databreachThe Online Trust Alliance (OTA) has just released its 2016 Data Protection and Breach Readiness Guide.

This week, the non-profit organization with the mission “to enhance online trust,” shared the report’s findings with MMW.

The guide, in a nutshell, provides prescriptive advice to help businesses optimize online privacy and security practices, and detect, contain and remediate the risk and impact of data loss incidents.

As part of the report, OTA analyzed key cybersecurity and online privacy trends.

“Much like surge pricing for taxis, cybercriminals now target and calculate their ransomware pricing based on company size, market value and much more,” says Craig Spiezle, Executive Director and President of OTA. “Cyber-surge pricing of corporate data is becoming widespread, increasing the impact and costs for businesses and their employees worldwide.”

Astonishingly, OTA found 91 percent of data breaches that occurred from January to August of 2015 could have “easily been prevented” by, for example, patching a server, encrypting data or ensuring employees do not lose their laptops.

OTA also announced that when analyzing over a thousand breaches involving the loss of personally identifiable information (PII) in 2015, it found actual hacks accounted for 34 percent of all incidents, while 30 percent were caused by employees—accidentally or maliciously—due to a lack of internal controls. The balance of incidents can be primarily attributed to lost or stolen devices (7 percent) and social engineering/fraud (8 percent). Lost, stolen or misplaced documents accounted for 9 percent of all incidents.

“As companies amass larger quantities of diversified data and increase their reliance on third party service providers, every business must have safeguards in place and be prepared to react strategically in the event of a breach,” said Neil Daswani, Chief Information Security Officer at LifeLock. “Cybercriminals aren’t just targeting companies that collect consumer data, they are going after confidential high-value data from legal, accounting, architecture and engineering firms.”

To learn more, check out the  2016 Data Protection and Breach Readiness Guide.

The post Online Trust Alliance Exposes How Rash of Ransomware Could Have Been Avoided appeared first on Mobile Marketing Watch.

]]>
Webinar: Understanding Malware Lateral Spread Used in High Value Attacks https://mobilemarketingwatch.com/webinar-understanding-malware-lateral-spread-used-in-high-value-attacks/ Thu, 21 Jan 2016 10:00:05 +0000 http://mobilemarketingwatch.com/?p=64795 On Thursday, January 28 at 9 a.m. PST, a webinar will tackle one of the most precarious issues of the digital age — the nefarious spread of malware. The webinar will be presented by Nick Bilogorskiy of Cyphort Labs. “APTs are known to use advanced Techniques, Tactics, and Procedures (TTP), including advanced malware design with...

The post Webinar: Understanding Malware Lateral Spread Used in High Value Attacks appeared first on Mobile Marketing Watch.

]]>
Webinar Understanding Malware Lateral Spread Used in High Value AttacksOn Thursday, January 28 at 9 a.m. PST, a webinar will tackle one of the most precarious issues of the digital age — the nefarious spread of malware.

The webinar will be presented by Nick Bilogorskiy of Cyphort Labs.

“APTs are known to use advanced Techniques, Tactics, and Procedures (TTP), including advanced malware design with protection layers, sandboxing evasion, and lateral movement inside penetrated networks to seek out high value targets,” a statement emailed to MMW reads.

In this webinar, Nick Bilogorskiy of Cyphort Labs will:

  • Review various lateral movement techniques and methods used by past advanced threats
  • Look at APT samples, like Shamoon, in detail to show the specific steps in the lateral movement by the malware
  • Provide an understanding of how lateral movement of APT should help security defenders to better select and implement protection solutions

To learn more or to register, click here.

The post Webinar: Understanding Malware Lateral Spread Used in High Value Attacks appeared first on Mobile Marketing Watch.

]]>
ABI Research: Security Testing Market Should Grow to $6.9 Billion by 2020 https://mobilemarketingwatch.com/abi-research-security-testing-market-should-grow-to-6-9-billion-by-2020/ Wed, 30 Dec 2015 15:00:19 +0000 http://mobilemarketingwatch.com/?p=53094 Web and cloud-based software applications are not just critical tools to connect people today, but they’re also a constant security threat. In a recent competitive analysis, ABI Research, a leader in technology market intelligence, analyzed the importance of software security. The firm forecasts that the security testing market will grow to $6.9 billion by 2020....

The post ABI Research: Security Testing Market Should Grow to $6.9 Billion by 2020 appeared first on Mobile Marketing Watch.

]]>
Email Security Threats Remain a Persistent HeadacheWeb and cloud-based software applications are not just critical tools to connect people today, but they’re also a constant security threat.

In a recent competitive analysis, ABI Research, a leader in technology market intelligence, analyzed the importance of software security. The firm forecasts that the security testing market will grow to $6.9 billion by 2020.

Still, there’s some resistance.

“The biggest challenge for company software developers lies in market forces and funding,” says Monolina Sen, Senior Analyst at ABI Research. “Their incentives, and consequentially their priorities, are tied to implementing new features and meeting deadlines. With companies always aiming to shorten product cycles, app security is usually among the first add-on to be cut.”

Traditionally, security audits and quality assurance testing happen toward the end of the development cycle, by which point most security issues are expensive to fix.

“The changing threat landscape and increasing frequency of application attacks, however, is forcing security-focused organizations to more adequately address web application security through secure software development. As such, application security testing is becoming crucial for organizations to adhere to compliance regulations, while at the same time defending themselves from security attacks,” a provided statement reads.

In its report, ABI Research reviewed the software security approaches of six industry vendors: Acunetix, Checkmarx, Cigital, IBM, Qualys, and Veracode. The report highlights current software security development trends and provides insight into the secure software development solutions existing in the market, as well as their effectiveness.

The report can be accessed here.

The post ABI Research: Security Testing Market Should Grow to $6.9 Billion by 2020 appeared first on Mobile Marketing Watch.

]]>
Op-Ed: Halting Hackers For The Holidays https://mobilemarketingwatch.com/op-ed-halting-hackers-for-the-holidays/ Thu, 03 Dec 2015 13:33:08 +0000 http://mobilemarketingwatch.com/?p=52832 The following is a guest contributed post from Gary Miliefsky, Founder of SnoopWall Inc. October was National Cyber Security Awareness month and during that time, millions of online identities were stolen in America with more than 200 published breaches. We’re now getting close to 1 billion records of identity theft – more than three times...

The post Op-Ed: Halting Hackers For The Holidays appeared first on Mobile Marketing Watch.

]]>
Op-Ed Halting Hackers For The HolidaysThe following is a guest contributed post from Gary Miliefsky, Founder of SnoopWall Inc.

October was National Cyber Security Awareness month and during that time, millions of online identities were stolen in America with more than 200 published breaches.

We’re now getting close to 1 billion records of identity theft – more than three times our entire population in the United States.

Nearly two-thirds of Americans have heard, read or seen something about online safety and security issues recently, according to StopThinkConnect.org. Yet consumers also say they don’t take steps to stay safe online because they lack information or knowledge.

So here are my best tips to help you enjoy the Christmas shopping experience without losing your privacy and identity or putting your children’s safety at risk:

Change your passwords – all of them. Do it now and do it as frequently as you can tolerate. If you don’t want to change them often, then use any unique characters you can think of, such as a dollar sign ($) or an exclamation mark (!) or replace a letter “O” with a 0 (zero). This goes a long way in preventing brute force attacks against your password. Also, never trust anyone on the phone who asks for your password, especially if they called you. The same holds true with emails. Both the telephone and email are used by people who try to get your password by pretending to be the IRS, your bank or someone else you have an account with.

Clean up your apps. Assume most of your smartphone or tablet apps are malware that spies on you and your online behavior. Do you really need them? Delete any apps you don’t use often. Replace apps that take advantage of too many of your privacy settings with similar apps that don’t. On an iPhone, you’re not being eavesdropped on until you run the app.

Shop online only from websites you trust. If you don’t know where the merchant is located, don’t shop online there. If they don’t have a corporate address or are located in another country, it could be iffy whether you ever see the goods you think you purchased. Also, if their shopping-cart experience is not an HTTPS browser session, then everything you type in ¬– your name, address and credit card information – is going over the Internet unencrypted, in plain view.

Never buy online using your credit card on a site that doesn’t have SSL (secure sockets layer) encryption installed. It’s easy to tell you are in a secure, encrypted session. You should see an icon of a locked padlock in your browser and the website URL starts with HTTPS not HTTP. Also, if you receive emails from the merchant, no matter the reason, don’t give them your credit card information over email.

Don’t use cash or debit cards. You have three major choices when shopping – cash, credit or debit. In rare but growing instances there’s even a fourth option called “Bitcoins,” which are now accepted at some merchants including Overstock.com. Bitcoins could be considered the equivalent to the cash option, because once used, you can’t get them back. So, if you have to choose among these options, the best is the credit card.

Here’s why: If you experience identity theft, credit card laws allow you to keep all of your credit immediately, with no responsibility during an identity theft or fraud investigation. With a debit card, your bank’s policy can be to tie up your money in the amount of the fraudulent transactions for up to 30 days. Some have been known to take up to 60 days to resolve the issue.

• Don’t use public WiFi without using SSL encryption. Public Wifi networks can be a hacker’s dream. If they want, they can see what websites you are visiting and insert malware into your computer or other device. The hacker also has access to any information you are sending out over the Internet, which could include credit card numbers or other critical information.

The post Op-Ed: Halting Hackers For The Holidays appeared first on Mobile Marketing Watch.

]]>
No Shocker Here: Cyber Security Is Priority One for Marketers Today https://mobilemarketingwatch.com/no-shocker-here-cyber-security-is-priority-one-for-marketers-today/ Wed, 02 Dec 2015 15:00:27 +0000 http://mobilemarketingwatch.com/?p=52812 What do three in five U.S. executives worry about most? You’d be right if you guessed security. Maybe it’s because American consumers hear news reports of breaches, hacks, stolen data and identities, and fraud nearly every day — which puts a damper on digital business. Interestingly, though cyber security is a top concern for U.S....

The post No Shocker Here: Cyber Security Is Priority One for Marketers Today appeared first on Mobile Marketing Watch.

]]>
Internet Security System

What do three in five U.S. executives worry about most? You’d be right if you guessed security.

Maybe it’s because American consumers hear news reports of breaches, hacks, stolen data and identities, and fraud nearly every day — which puts a damper on digital business.

Interestingly, though cyber security is a top concern for U.S. and European honchos, executives in Asia are less concerned, according to July 2015 stats reported by eMarketer.

The info came from a CNBC, MindMover, and Lightspeed GMI survey of more than 500 business executives in the US, Europe, and Asia-Pacific.

“More than half of US respondents said cyber security was a leading technology priority in the next 12 months, and 41 percent of executives in Europe said it was a priority for them as well,” reports eMarketer. “For executives in Asia-Pacific, however, cyber security was not the utmost priority — only a quarter of respondents said it was important to them.”

However, mobile ecommerce, internet of things (IoT), connected devices, mobile application development, and cloud technology were all bigger priorities than cyber security in this region.

The CNBC survey backs up April, 2015 research by PricewaterhouseCoopers (PwC) that suggests cyber threats, including lack of data security, was an area of “extreme concern” among 45 percent of U.S. CEOs.”

The post No Shocker Here: Cyber Security Is Priority One for Marketers Today appeared first on Mobile Marketing Watch.

]]>
New Survey Reveals Consumer Concerns About the Cloud https://mobilemarketingwatch.com/new-survey-reveals-consumer-concerns-about-the-cloud/ Fri, 30 Oct 2015 13:15:39 +0000 http://mobilemarketingwatch.com/?p=52452 Radware, a provider of cyber security and application delivery solutions, has just released a report entitled Mobile Application Security: Consumer Perspectives and Organizational Implications. Radware commissioned Harris Poll to conduct the survey online among more than 2,000 U.S. adult consumers. The survey was designed to gauge opinions on cloud-based apps and services and their usage....

The post New Survey Reveals Consumer Concerns About the Cloud appeared first on Mobile Marketing Watch.

]]>
New Survey Reveals Consumer Concerns About the CloudRadware, a provider of cyber security and application delivery solutions, has just released a report entitled Mobile Application Security: Consumer Perspectives and Organizational Implications.

Radware commissioned Harris Poll to conduct the survey online among more than 2,000 U.S. adult consumers.

The survey was designed to gauge opinions on cloud-based apps and services and their usage.

Consumers often don’t realize that the applications they depend upon daily live in the cloud and therefore many may be unaware of the threat of breach to their personal data. Over two-thirds (67%) of Americans say they don’t currently use cloud-based applications. Meanwhile, cloud-based mobile apps continue to grow in popularity.

While 87% of consumers say they believe cloud applications could be hacked; 58% of cloud-based app/service users say they are worried about the security of their personal data should the service get hacked.

“Data breaches and hacks are not only on the rise, they are becoming commonplace,” says Ben Desjardins, Director of Security Solutions Marketing at Radware. “At the same time, cloud-based apps are booming, offering convenient ways to expedite and simplify daily needs from ordering a meal to requesting a car with the tap of a finger. Consumers by and large don’t understand the cloud-based nature of what’s behind the tap, and so companies trying to engage with customers through these apps will bear the burden of education and remediation in the event of a data breach.”

The post New Survey Reveals Consumer Concerns About the Cloud appeared first on Mobile Marketing Watch.

]]>
Experian, T-Mobile Data Breach Draws Concern and Anger https://mobilemarketingwatch.com/experian-t-mobile-data-breach-draws-concern-and-anger/ Fri, 02 Oct 2015 13:30:02 +0000 http://mobilemarketingwatch.com/?p=52093 Late Thursday, word began to circulate quickly that a significant security breach in the world of mobile has occurred. “Experian has suffered a major data breach,” CNN confirmed. We’re told, quite alarmingly, that those behind the breach likely procured an array of data — the personal information of approximately 15 million people, all of whom...

The post Experian, T-Mobile Data Breach Draws Concern and Anger appeared first on Mobile Marketing Watch.

]]>
Experian, T-Mobile Data Breach Draws Concern and AngerLate Thursday, word began to circulate quickly that a significant security breach in the world of mobile has occurred.

“Experian has suffered a major data breach,” CNN confirmed.

We’re told, quite alarmingly, that those behind the breach likely procured an array of data — the personal information of approximately 15 million people, all of whom reportedly applied for T-Mobile’s service during the month of September.

Anyone who applied for a regular T-Mobile USA postpaid plan between Sept. 1, 2013 and Sept. 16, 2015 might be affected. T-Mobile used Experian, one of the three major credit bureaus, to conduct credit checks on its customers.

“Obviously I am incredibly angry about this data breach and we will institute a thorough review of our relationship with Experian,” T-Mobile CEO John Legere said last night. “I take our customer and prospective customer privacy VERY seriously.”

To read the full report from CNN, click here.

The post Experian, T-Mobile Data Breach Draws Concern and Anger appeared first on Mobile Marketing Watch.

]]>
Pixalate Launches First Security Hardware Appliance for Advertising https://mobilemarketingwatch.com/pixalate-launches-first-security-hardware-appliance-for-advertising/ Thu, 25 Jun 2015 12:30:20 +0000 http://mobilemarketingwatch.com/?p=50819 Advertising fraud has become a systemic problem and a top concern for marketing organizations everywhere. As nearly 75% of all advertising is purchased through programmatic channels, this translates into a $6 billion problem. To address this issue, Pixalate, Inc., a leader in fraud protection and data intelligence, introduced Pixalate Security Threat Intelligence Dome on Tuesday...

The post Pixalate Launches First Security Hardware Appliance for Advertising appeared first on Mobile Marketing Watch.

]]>
Pixalate Launches First Security Hardware Appliance for AdvertisingAdvertising fraud has become a systemic problem and a top concern for marketing organizations everywhere.

As nearly 75% of all advertising is purchased through programmatic channels, this translates into a $6 billion problem. To address this issue, Pixalate, Inc., a leader in fraud protection and data intelligence, introduced Pixalate Security Threat Intelligence Dome on Tuesday as part of their Pixalate Fraud Intelligence Platform.

This is the industry’s first-ever programmatic advertising fraud prevention hardware appliance that prevents fraud from entering programmatic advertising systems.

Security Dome connects to the Pixalate Global Fraud Intelligence cloud which has insights about fraudulent activity based on the analysis of more than 100 billion global impressions, evaluating 350 million IPs each month, to identify and block 100% of known fraudulent inbound requests.

This in turn allows supply-side and demand-side providers with more bandwidth and increases the percentage of legitimate ads viewed by consumers.

Pixalate’s five fraud-intelligence feeds include:

  • IP reputation – identifies known IP addresses associated with malicious or compromised devices.
  • Anti-phishing/malware – identifies Internet domains found to be associated with malware or phishing activity.
  • Blacklisted user agent— identifies bots such as search crawlers that leverage user agents.
  • Proxy gateway – identifies proxies, TOR nodes and network gateways used to hide real IP addresses
  • Blacklisted domain – identifies blocked domains associated with previous malicious activity

Marketing organizations can purchase the Fraud Threat Intelligence Platform hardware appliance and customers can purchase it in a virtual form factor or deployed as-a-service.

For more information, click here.

The post Pixalate Launches First Security Hardware Appliance for Advertising appeared first on Mobile Marketing Watch.

]]>