Today I have published the first part of a two-part article on device security over on CyberAwake. This is something many organisations skip over, if they have implemented a password policy and MFA! Device Security (Pt. 1) – CyberAwake Often the reluctance to take action is because they are concerned …
Let’s finish the week with some Android malware
You have to exercise some control of any Android devices that your team are using for “BYOD”. At the very least educate them in the risk of Android apps even if they are downloaded from the Google Play Store. Rogue apps do get through: Apps with 1.5M installs on Google …
Continue reading “Let’s finish the week with some Android malware”
BYOD advice – Find malware where you least expect it
BYOD – bring your own device – probably every organisation has non-company devices handling sensitive information. Threat actors have created a trojanised version of a legitimate game installer that they are promoting through side channels to attract users (victims) to install it. The Super Mario game is installed and works …
Continue reading “BYOD advice – Find malware where you least expect it”
You need an Android smartphone BYOD policy
Here is another mass download of a malware infected Android app: SpinOk Android malware found in more apps with 30 million installs (bleepingcomputer.com) Please have a look at this: Scanning for Apple iPhone iOS malware You need a bring-your-own-device policy for your phones. This policy should also include to company …
Continue reading “You need an Android smartphone BYOD policy”
Scanning for Apple iPhone iOS malware
This is not what you are thinking. It is not a malware scanner on your Apple iPhone and it is for a very specific malware infection. What it is a multi-platform scanner produced by, the Russian security company, Kaspersky to detect if an iOS device has been infected with ‘Triangulation’ …