Divide Between Work, Personal Data on Android Breached
Researchers demonstrate how malicious apps can break into secure Android work containers on EMM managed phones.
Threatpost | The first stop for security news
Researchers demonstrate how malicious apps can break into secure Android work containers on EMM managed phones.
Threatpost | The first stop for security news
Cybercriminals acting on behalf of national governments and nation-backed espionage agents carrying out cybercrimes for cash on the side is the future of security threats facing corporations and governments, says the former top U.S. attorney in charge of the Department of Justice’s national security division.
“I think this blending of criminal and national security, whether it’s terrorists or state actors moonlighting as crooks or state actors using criminal groups as a way to distance themselves from the action, I think that is a trend that we saw increasing that’s just going to continue to increase over the next three to five years,” says John Carlin, now an attorney with Morrison & Foerster.
To read this article in full or to leave a comment, please click here
Former New York Mayor Rudy Giuliani says Donald Trump has tapped him to gather top cybersecurity leaders to meet with the administration regularly to share “all the information available in the private sector” with the goal of improving national cyber defenses “because we’re so far behind.”
“The president elect-decided he wanted to bring in on a regular basis the people in the private sector, the corporate leaders in particular and thought leaders in the private sector who are working on security for cyber because we’re so far behind,” Giuliani said on Fox and Friends.
To read this article in full or to leave a comment, please click here
BleepingComputer |
Researchers Find "Strong Connection" Between NSA Hackers and Leaked Files
BleepingComputer Not malware you find in networks. Both sides, RAT + LP, full state sponsor tool set? We find cyber weapons made by creators of stuxnet, duqu, flame. Kaspersky calls Equation Group. We follow Equation Group traffic. We find Equation Group source range. |