Skip Links

BYOD Research Center

Bring your own device strategies, policies, management tools and product news and information.

BYOD News
Trojan program 'Neverquest' a new threat to online banking users, researchers say
A new Trojan program that targets users of online financial services has the potential to spread very quickly over the next few months, security...
Crimeware kit includes Bitcoin, Litecoin miner module
A new malicious software program, advertised for sale on underground forums, claims to mine and steal bitcoins, according to a Danish security...
'Blackshades' malware still being sold, Symantec says
Cybercriminals are increasingly using the "Blackshades" malware program whose source code was leaked three years ago, according to an...
NSA reportedly compromised more than 50,000 networks worldwide
The U.S. National Security Agency reportedly hacked into over 50,000 computer networks around the world as part of its global intelligence gathering...
Twitter tightens security against NSA snooping
Twitter has implemented new security measures that should make it much more difficult for anyone to eavesdrop on communications between its servers...
Browser extension creates 'disposable' data for privacy
A Boston-based company, Abine, is beefing its anti-tracking browser extension to let users shield their real credit card details, email addresses and...
Cybercrime forum advertises financial malware that uses stealthy I2P communications
A new financial malware program that communicates with attackers over the I2P (Invisible Internet Project) anonymity network is for sale on a Russian...
Trojan program steals log-in credentials, other sensitive data from SAP client applications
A recently discovered malicious program steals log-in passwords and other sensitive information from SAP client applications and allows...
Hackers reportedly stole 42 million customer records from online dating network Cupid Media
Hackers reportedly stole 42 million customer records including email addresses and clear-text passwords from Cupid Media, a network of dating...
GitHub bans weak passwords after brute-force attack results in compromised accounts
Popular source code repository service GitHub has recently been hit by a brute-force password-guessing attack that successfully compromised some...
EU Parliament could block data sharing with the US
The European Parliament will not approve any data sharing deal with the United States unless E.U. citizens have judicial redress when their personal...
Hackers actively exploiting JBoss vulnerability to compromise servers, researchers say
Attackers are actively exploiting a known vulnerability to compromise JBoss Java EE application servers that expose the HTTP Invoker service to the...
Chomsky, Gellman talk Big Data at MIT Conference
Big Data is arguably the biggest buzz term in security today, so it came as no surprise that Noam Chomsky and Barton Gellman had no shortage of words...
Rise seen in use of Google service for mobile botnets
Mobile botnets are on the rise and cybercriminals are using the Google Cloud Messaging service as a conduit for sending data from command-and-control...
The best data security offense is a good defense
After several missed security audits, the IT team at the Pennsylvania Department of Public Welfare jumped into action, building an ambitious security...
Lavabit-DOJ dispute zeroes in on encryption key ownership
The government's insistence, in its dispute with Lavabit, that cloud service providers hand over their encryption keys when asked, has refocused...
Google fixes Chrome vulnerabilities exploited at Pwn2Own contest
Google released emergency security updates for Chrome in order to patch critical vulnerabilities demonstrated Thursday by a security researcher at...
Cybercriminals target Silverlight users with new exploit kit
The creators of a Web-based attack tool called Angler Exploit Kit have added an exploit for a known vulnerability in Microsoft's Silverlight...
Dropbox makes its play for business users
Dropbox is hoping to capitalize on the growing use of its file hosting service among businesses with a new product built from scratch that is...
Lawmakers: HealthCare.gov security warnings came before launch
Top IT officials from U.S. President Barack Obama's administration insisted HealthCare.gov is as secure as possible, despite questions raised...