As smartphone users turn to their devices to complete more tasks, hackers are exploiting vulnerabilities. People are increasingly turning to their phones to complete their regular daily activities and as this trend grows, so does the number of mobile security attacks. Hackers see the use of smartphones for personal and work purposes as a prime opportunity. The more people use their smartphones to complete work and personal tasks, the more hackers are seeing vulnerabilities that they can exploit. This, according the fifth annual Mobile Security Index (MSI) from Verizon. That…
Read MoreTag: cyberattacks
Cyber Attacks Don’t Die, They Evolve
Cybersecurity often feels like taking one step forward and two steps back. An attack will appear, the security community will respond, and eventually the threat will be eradicated. Then, a few months down the road, the threat reappears in a newer and stronger form. Most commonly, it’s evolved to specifically bypass the defenses created to combat it. This has always been true of cyberattacks. The earliest hackers searched for ways to tweak or re-purpose code after encountering a new defense. Or, rather than search for new vulnerabilities, they found new…
Read More