SECURITY CORRESPONDENT DANIEL BARDSLEY SPEAKS TO INDUSTRY EXPERTS ON HOW END-USERS CAN STEER CLEAR OF MALICIOUS MOBILE APPLICATIONS.
Over the holiday season at the end of last year, countless people around the world were given new Amazon Alexa virtual assistant devices – and were keen to try them out.
Many went on to the Apple App Store to download a mobile phone app that would show them how to configure their shiny new piece of kit.
There waiting for them was a free app, “Setup for Amazon Alexa”, that sounded perfect.
Many iOS phone users downloaded the app, making it, at one point, one of the 100 most popular free apps.
However, all was not as it should have been.
Many of the thousands who gave the app a rating complained that it failed to work properly, leaving them unable to operate their precious Alexas.
What is more, some were worried that had made themselves vulnerable to being hacked, as they had provided their device serial number, IP address and other details.
Following a flurry of complaints and multiple news stories, Apple ejected the errant app from its official store.
Android phone users to have been plagued by fraudulent apps, thousands of which have come and gone over the years.
Many are simply annoying because of the advertisements associated with them, while others create much bigger problems.
According to Dr. Tom Chothia, a lecturer in Computer Science at the University of Birmingham in the United Kingdom, “by far” the majority of bad apps will either be stealing personal data from users or plaguing them with advertisements. Such apps are often “relatively low impact” in their effects.
“The vast majority of apps out there are making money advertising to people who don’t want to be advertised to. Apps that try to steal money are relatively uncommon,” he says.
Bad apps are often put into one of two categories.
Bu hikaye Security Advisor Middle East dergisinin February 2019 sayısından alınmıştır.
Start your 7-day Magzter GOLD free trial to access thousands of curated premium stories, and 8,500+ magazines and newspapers.
Already a subscriber ? Giriş Yap
Bu hikaye Security Advisor Middle East dergisinin February 2019 sayısından alınmıştır.
Start your 7-day Magzter GOLD free trial to access thousands of curated premium stories, and 8,500+ magazines and newspapers.
Already a subscriber? Giriş Yap
KASPERSKY SHEDS LIGHT ON THE RANSOMWARE ECOSYSTEM
Ransomware is on the tip of everyone’s tongue every time businesses discuss cyber threats they are likely to face in 2021.
GAJSHIELD: ENABLING CONTEXTUAL VISIBILITY FOR OPTIMUM DATA PROTECTION
HARRISON ALBERT, REGIONAL DIRECTOR, D-LINK MIDDLE EAST AND AFRICA, TELLS SECURITY ADVISOR MIDDLE EAST HOW GAJSHIELD’S CONTEXT-BASED APPROACH TO SECURITY HELPS ORGANISATIONS FIND ANOMALIES, REDUCE FALSE ALARM AND PREVENT INTENTIONAL & UNINTENTIONAL DATA EXPLOITATION.
THALES ANNOUNCES NEW SOLUTIONS TO HELP OGANISATIONS DISCOVER, PROTECT AND CONTROL SENSITIVE DATA IN MULTICLOUD ENVIRONMENTS
THALES HAS ANNOUNCED NEW DATA PROTECTION SOLUTIONS FOR GOOGLE CLOUD, MICROSOFT AZURE, AND AMAZON WEB SERVICES, SOLIDIFYING ITS ROLE AS A TRUSTED THIRD PARTY FOR MULTI-CLOUD DATA SECURITY.
RANSOMWARE RECOVERY COST FOR UAE IN 2021 IS $517,961: SOPHOS SURVEY
THE SURVEY POLLED 5,400 IT DECISION MAKERS IN MID-SIZED ORGANISATIONS IN 30 COUNTRIES ACROSS EUROPE, THE AMERICAS, ASIA-PACIFIC & CENTRAL ASIA, THE MIDDLE EAST, AND AFRICA.
OVERCOMING THE CYBER-PANDEMIC
ABHIJIT MAHADIK, DIRECTOR, CYBERSECURITY & INFRASTRUCTURE – UAE & KSA, RAQMIYAT SPEAKS TO SAME ABOUT THE EVOLVING CYBERSECURITY LANDSCAPE, THE THREATS ORGANISATIONS NEED TO WATCH OUT FOR AND HOW THE SECURITY PRIORITIES OF ORGANISATIONS HAVE SHIFTED SINCE THE PANDEMIC LAST YEAR.
FORTINET: MAKING A MARK @ GISEC
ALAIN PENEL, REGIONAL VICE-PRESIDENT, MIDDLE EAST & PAKISTAN AT FORTINET, EXPLAINS WHAT IT MEANS TO BE A PART OF GISEC THIS YEAR AND HOW FORTINET’S CUTTING-EDGE SOLUTIONS CONTINUE TO PROVIDE MAXIMUM PROTECTION AGAINST CYBERTHREATS AND ATTACKS.
ANATOMY OF AN OT ATTACK
MAHER JADALLAH, SENIOR DIRECTOR - MIDDLE EAST & NORTH AFRICA AT TENABLE, DISCUSSES HOW, INSTEAD OF DEFENDING AGAINST AN ATTACK IN PROGRESS, A MORE SUSTAINABLE APPROACH WOULD BE ONE OF PREVENTION – OF ORGANISATIONS DOING A BETTER JOB OF UNDERSTANDING THEIR SYSTEMS, WHERE AND HOW THOSE SYSTEMS MAY BE EXPOSED, AND PRIORITISING THE THINGS THEY NEED TO PROTECT THESE SYSTEMS.
MICRO FOCUS: OFFERING DRAMA-FREE IT WITH OPTIC
TOUFIC DERBASS, MANAGING DIRECTOR MICRO FOCUS MIDDLE EAST & AFRICA, DISCUSSES HOW THE LATEST IT PLATFORM FROM MICRO FOCUS OFFERS UNIFIED INTERFACE AND & EXPANDED INTEGRATION CAPABILITIES.
COPING WITH THE NEW NORMAL
HUSNI HAMMOUD, MANAGING DIRECTOR - ESET ME, BARRACUDA NETWORKS, IVANTI (PART OF MIDIS GROUP), TELLS SECURITY ADVISOR HOW THE CHALLENGES OF THE LAST ONE YEAR HAVE CHANGED THE BUSINESS LANDSCAPE AND HOW ORGANISATIONS ARE NAVIGATING NEW TRENDS.
AN IN-DEPTH DEFENCE STRATEGY
WERNO GEVERS, REGIONAL MANAGER, MIMECAST MIDDLE EAST, DISCUSSES HOW WHEN IT COMES TO EMAIL SECURITY, IT IS NECESSARY FOR SECURITY PROFESSIONALS TO EVOLVE FROM A PERIMETER-BASED DISCIPLINE TO A MORE PERVASIVE ONE.