Application Security September 23, 2019 iOS 13 at Work, Part 1: Enabling Single Sign-On (SSO) and Distributing Custom Apps 3 min read - With iOS 13, organizations can more easily distribute corporate applications to users and can integrate new single sign-on capabilities.
Endpoint September 17, 2019 Mobile Device Disposal: Best Practices for Burying BYOD Endpoints Without Risk 4 min read - Traditional end-of-life procedures for corporate mobile devices can't scale to BYOD. Learn how to avoid the risks that can occur during personal device disposal.
September 9, 2019 New GootKit Malware Sample Evades Detection With Path Exclusion 2 min read - A new sample of the GootKit malware family evaded detection from Windows Defender by setting a path exclusion.
September 2, 2019 Weekly Security News Roundup: TrickBot Adds Capabilities to Target US Mobile Users 3 min read - Security researchers came across a new variant of TrickBot that arrived with new features allowing it to target U.S. mobile users. Learn what else happened last week in security news.
August 28, 2019 Android App Potentially Served Trojan to 100 Million+ Google Play Users 2 min read - A PDF creator app potentially served a Trojan to more than 100 million Android users via downloads on the Google Play store.
Application Security August 26, 2019 What’s New With Q? A Guide to the Next Stage of Android 4 min read - From consumer privacy to enterprise scalability, the Android Q platform is undergoing major developments.
August 20, 2019 Attackers Spread Bolik Banking Trojan Disguised as a Reputable VPN App 2 min read - Threat actors are spreading around samples of the Bolik banking Trojan family disguised as a reputable virtual private network (VPN) app.
August 19, 2019 Evasive Adware Infiltrated 85 Photography and Gaming Apps on Google Play Store 2 min read - An evasive family of adware posed as 85 photography and gaming apps available for download on the Google Play store.
Endpoint August 19, 2019 How Video Became a Dangerous Delivery Vehicle for Malware Attacks 4 min read - The lure of video might be the perfect social engineering trick for malware attacks. Here's how your enterprise security team can fight back.
Endpoint August 13, 2019 UEM’s Sophomore Year: ‘2019 Gartner Magic Quadrant for Unified Endpoint Management Tools’ 4 min read - IBM was named a Leader in the "2019 Gartner Magic Quadrant for Unified Endpoint Management" for its ability to execute and lead the entire field of vendors in its completeness of vision.