Notorious iOS spyware, Pegasus, has an Android sibling

Security researchers have uncovered the Android version of an iOS spyware known as Pegasus in a case that shows how targeted electronic surveillance can be.

Called Chrysaor, the Android variant can steal data from messaging apps, snoop over a phone’s camera or microphone, and even erase itself.

On Monday, Google and security firm Lookout disclosed the Android spyware, which they suspect comes from NSO Group, an Israeli security firm known to develop smartphone surveillance products.

Fortunately, the spyware never hit the mainstream. It was installed less than three dozen times on victim devices, most of which were located in Israel, according to Google. Other victim devices resided in Georgia, Mexico and Turkey, among other countries.

Users were probably tricked into downloading the malicious coding, perhaps though a phishing attack. Once it installs, the spyware can act as keylogger, and steal data from popular apps such as WhatsApp, Facebook and Gmail. …

Source: Notorious iOS spyware, Pegasus, has an Android sibling

Share

How to protect every endpoint in your Enterprise of Things

By 2020, more than 25 percent of identified enterprise attacks will involve the Internet of Things.

Hackers have a new favourite target in the enterprise. They’ve turned their attention from servers to the growing number of devices with connectivity to corporate networks.

You want to maximize your employees’ mobile productivity, but you need to secure the explosion of endpoints with access to your sensitive company data. And don’t forget about safeguarding employee privacy and minimizing complexity for IT.

The new endpoint landscape demands a comprehensive approach to security and management. BlackBerry pioneered the mobile device management (MDM) category, then responded to changing security needs with a cross-platform enterprise mobility management (EMM) solution.

Unified Endpoint Management (UEM) is the next step in this evolution, helping you secure the full Enterprise of Things.

BlackBerry UEM delivers a trusted end-to-end security model and is the only single solution that addresses the full spectrum of potential breaches in an enterprise. It protects your data, everywhere it goes – without compromising productivity. If you want to be BlackBerry Secure, you need BlackBerry UEM.

Find out how BlackBerry UEM secures your enterprise from a single console.

Watch an on-demand webcast of why mobile devices are today’s biggest enterprise security threat.

Source: How to protect every endpoint in your Enterprise of Things

Share

The Phone Hack that Strangled 911

“911” Ring. Ring. Ring. Ring….

It’s easy to take for granted. You pick up a phone, punch a few buttons, and then someone’s there to help you in a time of great need, maybe even life or death.

It’s the emergency response phone system. Often called 911 in America. Although, it goes by other names; check out this list for emergency numbers in other countries.

A few months ago, this entire infrastructure was as risk. It wasn’t because of a huge government hack. Nor was it because a some lay about IT person, not standing guard. No, this hack happened at the endpoint, the end user. And the thing that almost crippled a national public safety system? A viral tweet. …

This hack only affected iPhones. Other smartphone OS’s were not vulnerable to the coded takeover.

It’s estimated that over half a million people saw this tweet, and it was clicked over 100,000 times. That’s a possible 100,000 phones that flooded their local 911s, 911s that might not be equipped to handle more than a few calls at a time, thus crippling their ability to handle any real emergencies. …

Source: The Phone Hack that Strangled 911 – UTB Blogs

Share

Four Disadvantages to Workers Playing Around With Consumer Mobile Apps in Your Enterprise

There are plenty of advantages to using the default mobile apps on iOS or Android. They’re convenient, for one – the moment you boot up your phone, you can check your mail, listen to music, and much more. They’re also easy to use and closely integrated with built-in device features.

Unfortunately, while they may be appealing for consumers, such apps are less so in a business context. When compared against their shortcomings, the advantages of built-in apps – and of consumer apps in general – are only skin-deep, and allowing their use is essentially playing games with both your business’s critical data and your bottom line. There are several reasons for this. …

Source: Four Disadvantages to Workers Playing Around With Consumer Mobile Apps in Your Enterprise

Share

Leading Analyst 451 Research Rates the Three Brightest Spots in BlackBerry’s Software Transformation

BlackBerry has come a long way in the last few years. Today’s BlackBerry is no longer solely about the smartphone, but about the smart in both the phone and in all manner of devices and endpoints that comprise the Enterprise of Things. …

Source: Leading Analyst 451 Research Rates the Three Brightest Spots in BlackBerry’s Software Transformation

Share

Hackers can attack your phone via 76 popular iOS apps

According to Will Strafach, CEO of New-York based Sudo Security Group, there are dozens of iPhone apps which are at risk of being hacked. They include apps such as Music Tube and Gift Saga. …

Source: Hackers can attack your phone via 76 popular iOS apps

Share