Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

A CISO's View of Mobile Security Strategy, With Stacey Halota

100%
0%

CISO of Graham Holdings Stacey Halota visits Dark Reading News Desk at Black Hat to discuss her talk at the CISO Summit, why securing mobile devices is a top priority despite their absence in recent mega-breach story lines, and how her company is using mobile devices to improve security, instead of threaten it.

Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
kaymera
50%
50%
kaymera,
User Rank: Apprentice
2/7/2018 | 4:14:26 AM
Not that difficult to hack a mobile device
We all have mobile devices and we are all connected. Everyone has email accounts, social media and access to their organization's email and their resources. If a hacker wanted to target someone or the organization, the best tool is the Mobile phone.

Most mobile phone users are really not aware of the cyber risks from downloading apps (without reviewing what access they are giving up), connecting to open WIFI networks at the cafe, airport, mall, etc... You might not even need a sophisticated attacking system to infect a mobile device, you just need to manipulate the user.

Everyone I know has a firewall or an antivirus software on their personal computer, however, most people do not have a Mobile Threat Defense app on their mobile phone. So it's important that a mobile phone user install a Mobile Threat Defense app such as the Kaymera CipherWatch app that will detect, prevent and protect the user /organization from mobile threats.
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7263
PUBLISHED: 2020-04-01
Improper access control vulnerability in ESConfigTool.exe in ENS for Windows all current versions allows a local administrator to alter the ENS configuration up to and including disabling all protection offered by ENS via insecurely implemented encryption of configuration for export and import.
CVE-2020-7066
PUBLISHED: 2020-04-01
In PHP versions 7.2.x below 7.2.9, 7.3.x below 7.3.16 and 7.4.x below 7.4.34, while using get_headers() with user-supplied URL, if the URL contains zero (\0) character, the URL will be silently truncated at it. This may cause some software to make incorrect assumptions about the target of the get_he...
CVE-2020-11445
PUBLISHED: 2020-04-01
TP-Link cloud cameras through 2020-02-09 allow remote attackers to bypass authentication and obtain sensitive information via vectors involving a Wi-Fi session with GPS enabled, aka CNVD-2020-04855.
CVE-2020-7064
PUBLISHED: 2020-04-01
In PHP versions 7.2.x below 7.2.9, 7.3.x below 7.3.16 and 7.4.x below 7.4.34, while parsing EXIF data with exif_read_data() function, it is possible for malicious data to cause PHP to read one byte of uninitialized memory. This could potentially lead to information disclosure or crash.
CVE-2020-7065
PUBLISHED: 2020-04-01
In PHP versions 7.3.x below 7.3.16 and 7.4.x below 7.4.34, while using mb_strtolower() function with UTF-32LE encoding, certain invalid strings could cause PHP to overwrite stack-allocated buffer. This could lead to memory corruption, crashes and potentially code execution.