Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Catching Mobile Malware In The Corporate Network
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
11/2/2013 | 2:10:27 PM
re: Catching Mobile Malware In The Corporate Network
The way apps, OEMs, OS are increasing and the way mobile malware, intrusions and vulnerabilities are growing, you need a secure network gate to prevent any intrusions to enter the corporate network else the whole network will be held for ransom. It has been clearly proved that mRATs can easily bypass MDMs and secure containers and attacking corporate networks. A real BYOD specific network behavioral analysis, and a complete BYOD specific vulnerability scan and risk analysis are need of the hour as work moves more and more to BYOD. Considering all, will be great if the solution is done without touching the device.

Manjunath M Gowda, ceo i7 networks (i7nw.com)
User Rank: Apprentice
10/30/2013 | 12:18:26 PM
re: Catching Mobile Malware In The Corporate Network
i want to be a hacker...
Chuck Brooks
Chuck Brooks,
User Rank: Apprentice
10/29/2013 | 12:21:26 AM
re: Catching Mobile Malware In The Corporate Network
As BYOD becomes more prevalent in both the corporate world and government, malware becomes a growing problem in mobility. Detection and patches are really not enough. a hardware/software endpoint mobile solution may be the best avenue to protect devices in the long run.

Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-21
The Autoptimize WordPress plugin before 2.7.8 attempts to delete malicious files (such as .php) form the uploaded archive via the "Import Settings" feature, after its extraction. However, the extracted folders are not checked and it is possible to upload a zip which contained a directory w...
PUBLISHED: 2021-06-21
The Autoptimize WordPress plugin before 2.7.8 attempts to remove potential malicious files from the extracted archive uploaded via the 'Import Settings' feature, however this is not sufficient to protect against RCE as a race condition can be achieved in between the moment the file is extracted on t...
PUBLISHED: 2021-06-21
The Autoptimize WordPress plugin before 2.7.8 does not check for malicious files such as .html in the archive uploaded via the 'Import Settings' feature. As a result, it is possible for a high privilege user to upload a malicious file containing JavaScript code inside an archive which will execute w...
PUBLISHED: 2021-06-21
The Comments Like Dislike WordPress plugin before 1.1.4 allows users to like/dislike posted comments, however does not prevent them from replaying the AJAX request to add a like. This allows any user (even unauthenticated) to add unlimited like/dislike to any comment. The plugin appears to have some...
PUBLISHED: 2021-06-21
The WP Google Maps WordPress plugin before 8.1.12 did not sanitise, validate of escape the Map Name when output in the Map List of the admin dashboard, leading to an authenticated Stored Cross-Site Scripting issue