US Government (FTC and FCC) has started an investigation into mobile security patching practices

Mobile manufacturers and mobile operators generally leave mobile operating systems unpatched after selling it to the end user, or at best provides patching of security vulnerabilities way too late. The Stagefright vulnerability shows how severe this situation has become, with nearly 1 billion Android devices still vulnerable a year after the potentially remotely exploitable weakness [...]

Weak access privileges and lack of strong authentication in on-line gaming

Pure luck has saved a major on-line gaming organisation from a financial meltdown due to ransomware. Weak governance and implementation of access management together with lack of strong authentication and authorization have shown how easy attackers could enter into the very core of a critical infrastructure, even though state of the art technologies are used. [...]

THE CRIMINALS NEW WEAPON HAS ARRIVED – THE OVERLAY MALWARE – CHALLENGING THE CURRENT MOBILE SECURITY SOLUTIONS IN THE MARKET

Recent studies done by IBM (1), Symantec (2), Fireeye (3) on overlay malware such as Bial Bot, GM Bot, Cron Bot, KNL Bot and SlemBunk conclude that they are very cheap to buy on the black market and very simple to implement from a technical viewpoint.  These factors combined with the powerful capability to manipulate [...]