Bring Your Own Device (BYOD) has for the past few years been both a cause of sleepless nights for security bosses and a major flash point between the business and IT. To that we can now add wearable technology – smart watches, fitness trackers, head-mounted displays and the like which threaten to leak corporate data and expand the enterprise risk surface even further. IT consumerisation took another hit this month when new research revealed that some of the most popular apps in the world have password brute force vulnerabilities, exposing as many as 600 million Android and iOS users.
Of course, when it comes to BYOD and consumerisation, threats affecting personal devices can present major risks to corporate security too. This is why we regard consumerisation as one of the key pillars of cyber security strategy. Continue reading →
Last week Google made an announcement which could have a major impact on the security of the much-maligned Android mobile app ecosystem. Hidden away in the second half of a blog post on user experience in the online Play store came confirmation that the web giant is now reviewing apps before they can be published there. For Android and security watchers who’ve long complained that the platform was way too easy to upload malware onto, this is a noteworthy occasion. Continue reading →
It’s that time of the year again, when cyber security experts are called upon to tell the world what we should all be afraid of over the coming 12 months. At Trend Micro, our threat researchers around the globe actively study the landscape for new tools, techniques and procedures used by the bad guys. This TrendLabs research team helps us design the next generation of products to keep our customers safe and keeps us at the leading edge of the cyber security industry. Continue reading →