Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Catching Mobile Malware In The Corporate Network
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
11/2/2013 | 2:10:27 PM
re: Catching Mobile Malware In The Corporate Network
The way apps, OEMs, OS are increasing and the way mobile malware, intrusions and vulnerabilities are growing, you need a secure network gate to prevent any intrusions to enter the corporate network else the whole network will be held for ransom. It has been clearly proved that mRATs can easily bypass MDMs and secure containers and attacking corporate networks. A real BYOD specific network behavioral analysis, and a complete BYOD specific vulnerability scan and risk analysis are need of the hour as work moves more and more to BYOD. Considering all, will be great if the solution is done without touching the device.

Manjunath M Gowda, ceo i7 networks (i7nw.com)
User Rank: Apprentice
10/30/2013 | 12:18:26 PM
re: Catching Mobile Malware In The Corporate Network
i want to be a hacker...
Chuck Brooks
Chuck Brooks,
User Rank: Apprentice
10/29/2013 | 12:21:26 AM
re: Catching Mobile Malware In The Corporate Network
As BYOD becomes more prevalent in both the corporate world and government, malware becomes a growing problem in mobility. Detection and patches are really not enough. a hardware/software endpoint mobile solution may be the best avenue to protect devices in the long run.

Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-22
Improper authorization in handler for custom URL scheme vulnerability in ????????? (asken diet) for Android versions from v.3.0.0 to v.4.2.x allows a remote attacker to lead a user to access an arbitrary website via the vulnerable App.
PUBLISHED: 2021-06-22
Cross-site scripting vulnerability in Welcart e-Commerce versions prior to 2.2.4 allows remote attackers to inject arbitrary script or HTML via unspecified vectors.
PUBLISHED: 2021-06-22
Cross-site scripting vulnerability in ETUNA EC-CUBE plugins (Delivery slip number plugin (3.0 series) 1.0.10 and earlier, Delivery slip number csv bulk registration plugin (3.0 series) 1.0.8 and earlier, and Delivery slip number mail plugin (3.0 series) 1.0.8 and earlier) allows remote attackers to ...
PUBLISHED: 2021-06-22
NoSQL injection vulnerability in GROWI versions prior to v4.2.20 allows a remote attacker to obtain and/or alter the information stored in the database via unspecified vectors.
PUBLISHED: 2021-06-22
Improper authentication vulnerability in GROWI versions prior to v4.2.20 allows a remote attacker to view the unauthorized pages without access privileges via unspecified vectors.