AI – A Mandatory Requirement for Mobile App Security!

AI – A Mandatory Requirement for Mobile App Security!

Even if cybercriminals haven’t quite cracked machine learning yet, honest developers and security testers should get onboard the AI train anyway. It may be the best thing for mobile security since the dawn of the mobile OS and the apps that run on it.

Webinar: Mi3 Security™ CTO, Ken Lloyd, Presents CMDSP

Webinar: Mi3 Security™ CTO, Ken Lloyd, Presents CMDSP

On August 10th Ken Lloyd, Chief Technical Officer and Co-Founder of Mi3 Security and board member for CMDSP (Credentialed Mobile Device Security Professionals) will explain the leading Enterprise Mobility Credential, CMDSP and discuss the latest mobile security technologies that impact the IT Mobile Administrator.

Chatbots Revolution: Are Your Conversational Apps Safe?

Chatbots Revolution: Are Your Conversational Apps Safe?

The new generation of conversational assistants or chatbots for mobiles come the closest ever to making your Android or iOS device seem like a human companion. So, you could be forgiven for trying to appeal to a machine’s sense of ethics, if it looks like a chatbot was responsible for your mobile bank account being emptied or your personal data stolen.

BlackHat and DefCon 2017: What happens in Vegas doesn’t stay in Vegas!

BlackHat and DefCon 2017: What happens in Vegas doesn’t stay in Vegas!

Unfortunately for attendees of the BlackHat and DefCon 2017 conferences on IT and cyber security, this could become all too true. Unlike others on wild sprees in the gambling capital of America who would dearly like to leave all the evidence behind them, these conference attendees could be leaving valuable personal or company data, if the super-hackers have their way.

Healthcare is a Hacker's Paradise and It's Only Getting Worse!

Healthcare is a Hacker's Paradise and It's Only Getting Worse!

From a hacker’s point of view, healthcare has it all. There’s confidential personal data in abundance, including health information and social security details, mobile apps with sloppy security, and healthcare institutions and end users who can’t or won’t accept their vulnerability as targets. The road to IT security hell is being paved with good intentions and a strong dose of denial (“it’ll never happen to our clinic”). Consequently, cybercriminals have been flocking to healthcare sector to partake in the pickings.

Hey, Your Car Just Crashed Because Someone Hacked Your App!

Hey, Your Car Just Crashed Because Someone Hacked Your App!

The age of the car app is upon us. You can use the manufacturer’s app for your shiny new BMW, for example, to find your car in crowded parking lots, light the lights, honk the horn, and defrost it when temperatures are subzero, all remotely. That’s the good news. The bad news is that apps mean security holes that can be exploited by bad actors, and they won’t just be flashing your headlights or sounding your car horn. 

Evil Intelligence: Spying on the Smart City!

Evil Intelligence: Spying on the Smart City!

Many cities are already embarking on creative uses of systems, data, and applications, engaging with vendors, operations departments, and mobile device users to make life easier, be responsive, and cut expenses. However, security remains a critical issue. Among other things, smart cities multiply the opportunities of data theft and system sabotage for bad actors lying in wait for a chance to strike.

Lacking Security and Privacy in Voice Assistants Leave You Dangerously Exposed!

Lacking Security and Privacy in Voice Assistants Leave You Dangerously Exposed!

There’s a cute side and a dark side to the recent story of a six-year-old managing to order a $170 dollhouse via an Amazon Echo device, without Mom and Dad knowing. Unfortunately, the cute side wears thin rapidly, while the dark side could reach depths you never dreamed of.