Tag: Mobile Threats

Beware: Targeted Attacks on iPhone Users are a Thing | Lookout Blog

Beware: Targeted Attacks on iPhone Users are a Thing | Lookout Blog

In-brief: Lookout said it identified an active threat that was using three critical iOS zero-day (that is: previously unknown) vulnerabilities. When exploited, the three vulnerabilities “form an attack chain that subverts even Apple’s strong security environment.”

Facebook Internet Defense Prize Goes To Post-Quantum Key Exchange

Facebook Internet Defense Prize Goes To Post-Quantum Key Exchange

In-brief: Facebook announced the winner of its 2016 Internet Defense Prize last week. Researchers from universities in The Netherlands, Germany and Turkey to receive the $100,000 prize for a paper improving protections against attacks on TLS by quantum computers.

The Good, Bad and Ugly of Vulnerability Markets

The Good, Bad and Ugly of Vulnerability Markets

In-brief: Markets for information on software vulnerabilities are good for security. But they can also raise moral and ethical quandaries, especially in an age of cyber physical risks, argues Cisco’s Marc Blackmer.

Nokia says scale and security will help its Impact IoT platform best a crowded field. (Image courtesy of Nokia.)

Nokia: Security, Scale Give IMPACT IoT Platform An Edge

In-brief: After a fall from grace in the mobile handset business, Nokia is betting that its ability to do scale and security will help its Impact IoT platform best a crowded field. We speak with Rajesh Kashawa, head of Nokia’s Internet of Things Business Unit. 

A flaw in the way Google's Android verifies mobile applications opens the door to widespread attacks, according to researchers from Bluebox Security.

Smart TV + Rogue App = Surveillance Device

In-brief: researchers have demonstrated how a snooping Android application can turn an Android based smart television set into an omnibus surveillance device. Get ready for more IoT misappropriations like this.