

Tom Davison
EMEA Technical Director /*=$expert->feature_status*/ ?>
Lookout
Comments Dotted :
5
December 18, 2020
Customer education helps, but it is also critical to employ run-time application security to spot infected customer devices.
This attack demonstrates the extraordinary lengths that today's well funded and professional cybercriminal groups will go to when the end justifies the means.
Mobile devices present a multiplier effect as they become the mainstream platform for online banking. Consumer users need to protect themselves by understanding that mobile devices are not immune. It really is important to keep them updated, but also to verify the safety of installed apps and the validity of links being clicked. Most.....Read More

November 26, 2020
Mobile Device Management servers are by definition reachable from the public internet making them opportune targets.
The interesting story here is the assertion by cybersecurity agencies in the UK (NCSC) and the US (NSA) that nation-state APT groups are actively exploiting these vulnerabilities, five full months after patches were issued. Mobile Device Management servers are by definition reachable from the public internet making them opportune targets. Offering a gateway to potentially compromise every mobile device in the organisation, the attraction to attackers is clear. This highlights not just the.....Read More

October 27, 2020
The best defense is to keep systems patched and use security tools that can take advantage of huge datasets.
Cybercriminals are constantly iterating to evade detection and take advantage of new vulnerabilities. As a result, new variants of known malware are not uncommon, they may even be specifically crafted for the intended victim. The best defense is to keep systems patched and use security tools that can take advantage of huge datasets. This allows for proactive and ongoing identification of rogue behaviors rather than a reliance on specific signatures. The more data you can analyze the more.....Read More

February 07, 2020
To protect against mobile phishing requires mobile endpoint security on the device itself.
Firstly organisations need visibility into potentially vulnerable Android Operating System versions and risky configurations for all devices accessing business data. By taking an active approach to mobile vulnerability management, enterprises can reduce the potential attack surface. Secondly, employees need to be aware of the dangers and prevalence of mobile phishing attacks. Lookout has observed that 1 in 50 mobile devices in the enterprise encounters a phishing attempt daily. Phishing.....Read More

October 07, 2019
It is critical that users update both device operating systems and mobile apps.
Vulnerabilities in mobile operating systems and mobile apps provide the opportunity for attackers to gain persistence on the device, install further malware and leak data. This is the second vulnerability affecting WhatsApp this year and Lookout frequently sees these types of flaws being exploited by attackers, one example being the Pegasus spyware developed by NSO group. It is critical that users update both device operating systems and mobile apps. Enterprise should ensure visibility into.....Read More
