MWCA 2017 Highlight: Top 5 Security Risks for Connecting (and SECURING) the Americas

MWCA 2017 Highlight: Top 5 Security Risks for Connecting (and SECURING) the Americas

Mobile World Congress Americas (MWCA) 2017 just took place, with a plethora of current mobile products and solutions, and some tantalizing glimpses of future. The projections are for growth, growth, and more growth, either by equipping the mobile-less minority with mobile devices, or getting existing users to do even more with their mobiles, from controlling their toasters to managing networks of connected sensors.

WARNING: Use MWC Mobile App at Your Own Risk

WARNING: Use MWC Mobile App at Your Own Risk

As an attendee you would expect that a premier event such as MWC would take the appropriate measures to protect both itself and you, but they haven't. After leveraging our platform to rapidly analyze the MWC application we found multiple vulnerabilities that could put attendees at significant risk. What's worse is that one of the vulnerabilities has been around since 2012 and has been documented in at least nine different books (yes, nine) on mobile security and hacking mobile devices.

iOS, Android, Security, Privacy, and the Winner Is… Not Who You Think It Is!

iOS, Android, Security, Privacy, and the Winner Is… Not Who You Think It Is!

Check out each of these two mobile operating systems together with the keywords “security” and then “privacy” in your favorite search engine. It soon becomes clear how popular opinion stacks up for one versus the other. Yet recent results of tests of the top 100 apps for iOS and for Android could be a real eye-opener for many.

4 Reasons Why Machine Learning Is A Critical Component To Crowd-Sourced Security

4 Reasons Why Machine Learning Is A Critical Component To Crowd-Sourced Security

Collaborative and crowd-sourced security intelligence is on a path to disrupt traditional research firms, and the power of Machine Learning will become a big player to help these crowd-source platforms scale with the size and complexity of threat data in the market.

5X Mobile Security Productivity by Using Machine Learning to Combat The CyberSecurity Skills Shortage!

5X Mobile Security Productivity by Using Machine Learning to Combat The CyberSecurity Skills Shortage!

In the last few years it’s become nearly impossible for organizations to appropriately staff cybersecurity positions. According to Forbes, the market is looking at a global shortage of 2 million cybersecurity professionals by 2019, and that gap only looks to be increasing. One area where this is heavily felt is the 68% of companies that are increasing spending on mobile development, but have difficulty in filling the positions necessary to release safe and secure applications.

AI – A Mandatory Requirement for Mobile App Security!

AI – A Mandatory Requirement for Mobile App Security!

Even if cybercriminals haven’t quite cracked machine learning yet, honest developers and security testers should get onboard the AI train anyway. It may be the best thing for mobile security since the dawn of the mobile OS and the apps that run on it.

Webinar: Mi3 Security™ CTO, Ken Lloyd, Presents CMDSP

Webinar: Mi3 Security™ CTO, Ken Lloyd, Presents CMDSP

On August 10th Ken Lloyd, Chief Technical Officer and Co-Founder of Mi3 Security and board member for CMDSP (Credentialed Mobile Device Security Professionals) will explain the leading Enterprise Mobility Credential, CMDSP and discuss the latest mobile security technologies that impact the IT Mobile Administrator.

Chatbots Revolution: Are Your Conversational Apps Safe?

Chatbots Revolution: Are Your Conversational Apps Safe?

The new generation of conversational assistants or chatbots for mobiles come the closest ever to making your Android or iOS device seem like a human companion. So, you could be forgiven for trying to appeal to a machine’s sense of ethics, if it looks like a chatbot was responsible for your mobile bank account being emptied or your personal data stolen.

BlackHat and DefCon 2017: What happens in Vegas doesn’t stay in Vegas!

BlackHat and DefCon 2017: What happens in Vegas doesn’t stay in Vegas!

Unfortunately for attendees of the BlackHat and DefCon 2017 conferences on IT and cyber security, this could become all too true. Unlike others on wild sprees in the gambling capital of America who would dearly like to leave all the evidence behind them, these conference attendees could be leaving valuable personal or company data, if the super-hackers have their way.