2015 Mobile Threat Report

The following is external content provided as a free resource for blog readers.
The research illustrates that in 2014, nearly one million (931,620) unique malicious applications were produced, or rather a 391 percent increase from 2013 alone. Android devices continue to be the main target of malware and was 97 percent of all mobile malware developed.

Additional key findings from the report include:
  • The ability to take profit from an end user with SMS premium services or ad networks is a capability of each of the top 10 malware threats identified in 2014.
  • The overwhelming majority of Android malware is being developed and distributed in unregulated third party app stores in the Middle East and Asia.
  • There were four iOS targeted attacks in 2014 and most targeted jailbroken devices. However, WireLurker is the first example of a non-jailbroken iOS device being infected by tethering to an infected Mac device.
The Pulse Secure Mobile Threat Center conducts around-the-clock security, vulnerability and malware research on mobile device platforms. The Mobile Threat Report analyzes attacks, threat vectors and the common misuses of mobile devices that have led to a significant risk spike in mobile devices.

Request Free!

Government Web Security and the OWASP Top 10: The Big Picture

The following is external content provided as a free resource for blog readers.
Security on the web is becoming an increasingly important topic for organisations to grasp. Recent years have seen the emergence of the hacktivist movement, the increasing sophistication of online career criminals and now the very real threat posed by nation states compromising personal and corporate security. The Open Web Application Security Project gives us the OWASP Top 10 to help guide the secure development of online applications and defend against these threats. This course takes you through a very well-structured, evidence-based prioritisation of risks and most importantly, how government organisations building software for the web can protect against them.

Request Free!

How To Replace FTP and Increase File Transfer Efficiency by 98% With Biscom Secure File Transfer -- A Customer Success Story

The following is external content provided as a free resource for blog readers.

The increase in people sharing data and files, combined with size and security limitations of email and FTP, has forced organizations to seek solutions for sending large and confidential files while complying with a multitude of compliance and regulatory requirements. Biscom Secure File Transfer (SFT), a secure and managed file-transfer solution, handles file transfers easily and tracks all transactions. With its simple user interface, extensive reporting and auditing capabilities, and robust encryption and security technologies, SFT helps organizations meet their most challenging file delivery and collaboration needs.



Request Free!