Dell Security outlines key trends to watch in 2016.
Most Popular Enterprise Mobile Apps Leak Data
Surveillance data can be used to launch effective spear phishing attacks, which puts the enterprise at risk of a major breach.
Trojan Porn Clicker Initiative Infects Millions via Google Play
This family of malicious apps masquerades as popular games or apps in order to bypass Google’s security checks.
Child Monitoring Biz Attacks Researcher After Privacy Snafu
Online tussle follows discovery of misconfigured database at uKnowKids
UK Cybercrime Soars 20% in Two Years
PwC report claims 60% of firms don’t believe police can handle it
Nissan Disables App After Remote Hack Demo
Researchers claim attackers could control vehicle functions
Printers on Default Settings Still Open Backdoors
wireless-enabled printers remain deployed in a potentially vulnerable default configuration
Operation Dust Storm State Hackers Target Japan
Cylance report claims group has been around since 2010
MouseJack Flaw Affects Billions of Devices
Attackers can remotely hack wireless mice from within 100 meters away.
Most SSL VPNs are Wildly Insecure
SHA-1, Heartbleed and the insecure SSLv3 protocol all plague the arena.