The Internet of Things (IoT) started like any other buzzword: poorly defined, used too often, and generally misunderstood. However, it stood the test of time and is now increasingly becoming part of everyday language, even with those outside the IT world.
Smartwatches with network and communication functionality represent a new and open frontier for cyberattack. HP found that all tested smartwatches contain significant vulnerabilities, including insufficient authentication, lack of encryption and privacy concerns.
Trend Micro researchers have analyzed the code of the actual spyware: RCS Android. It can do so many things and spy on so many levels that they consider it the most sophisticated Android malware ever exposed.
Threat intelligence is a must-have for identifying malware and other threats that evade preventive security controls. But it's only as good as how you apply it – and many organizations aren’t applying it in a way that enables them to get the full value.
Assessing mobile applications seems like a complex task, but NowSecure Lab definitely disproves this notion: it mostly requires you (the user) to point and click, and occasionally to interact with the service a bit more.