A group of researchers from the Department of Information Systems Engineering at Ben-Gurion University in Israel have demonstrated and detailed a technique that can allow attackers to exfiltrate data from an "air-gapped" computer.
Nearly half of all cloud app activities and more than one-third of all data leakage policy violations occur on mobile devices, say the results of the October 2014 Netskope Cloud Report.
A zero-day flaw in Samsung's Find My Mobile system that can be extremely easily exploited to remotely lock a target's phone has been uncovered by programmer and researcher Mohamed Abdelbaset.
Approximately 40 percent of U.S. consumers who work for large enterprises said they use their personally owned smartphone, desktop or laptop daily for some form of work purposes, according to a recent survey by Gartner.
By now we have all heard about “The Snappening”—hyped as a high-profile data breach involving the photo-sharing application Snapchat.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.