PINDROP BLOG

Category: Device Security

February 17, 2016
Google Data Shows Dangers of Third-Party App Stores
TENERIFE–Google’s position in the Internet world is a unique one. In one or another, the company controls or sees much of the traffic on the network and owns one of the larger computing arsenals on the planet. It’s also in control of a decent chunk of the mobile world, thanks to Android’s popularity, and securing…
Read More →
February 16, 2016
MazarBOT Android Malware Spreads Via SMS
As phones have become more and more vital to users’ lives, attackers and fraudsters have focused a larger portion of their attention on those devices. One of the key methods of attack is delivering malware through texts or MMS messages and researchers have discovered a new malicious SMS campaign that is infecting Android phones and can…
Read More →
February 10, 2016
On the Wire Podcast: Mike Mimoso
In a remote episode of the podcast, Dennis Fisher talks with Mike Mimoso of Threatpost about the sessions from the Security Analyst Summit in Tenerife, Spain. The discussion touches on IoT security, the security development lifecycle, and whether device security will improve anytime soon.
Read More →
February 10, 2016
Time is Now For an IoT Security Development Lifecycle
TENERIFE–Microsoft engineers, executives, and developers have spent much of the past decade spreading the gospel of the security development lifecycle (SDL), trying to convert people and organizations to the religion of building security into software and other products from the beginning of the process. That effort has succeeded in many ways, and now experts say…
Read More →
February 9, 2016
Researchers Focus on Attacking Satellite Systems
TENERIFE–The security of wireless networks and devices is generally regarded as somewhere between mediocre and horrendous. And that’s after nearly 20 years of attention from researchers. Now, some of those researchers are focusing on satellite systems and networks and are finding the security of those targets depressingly bad. Gabriel Gonzalez, a researcher at IO Active,…
Read More →
February 8, 2016
Welcome to the Golden Age of IoT Hacking
TENERIFE–Nostalgia for the 1990s may be all the rage at the moment (see: The X-Files, The People vs. O.J. Simpson) but when it comes to security, no one is looking to go back 20 years. Sadly, that’s about where the security of many IoT devices belongs, experts say, and there doesn’t look to be much…
Read More →
February 8, 2016
On the Wire Podcast: Adam Shostack
Adam Shostack has done just about everything in the security community over the course of his career. He spent years at the late, lamented privacy start-up Zero Knowledge Systems, then moved to Microsoft, where he worked on a variety of projects. But he’s probably best known for his work on threat modeling at Microsoft and…
Read More →
February 1, 2016
On the Wire Podcast: Bruce Schneier
Bruce Schneier, the well-known cryptographer, author, and security expert, is today’s guest on the On the Wire podcast. Dennis Fisher talks with Schneier about the pervasiveness of commercial and government surveillance and tracking, the emerging problem of IoT security, and what can be done to address the technical and policy issues all of this entails.…
Read More →
February 1, 2016
Harvard Study Questions ‘Going Dark’ Crypto Problem
The FBI and other law enforcement and intelligence agencies have warned for years that the increased use of encryption by consumers is making surveillance and lawful interception much more difficult, impeding investigations. But a new study by a group of experts at Harvard’s Berkman Center says those claims are largely overblown and that the IoT…
Read More →
January 28, 2016
New Version of CenterPOS Malware Emerges
Researchers have discovered a new version of the CenterPOS malware that is capable of scraping memory and finding credit card data in running processes on infected devices. The malware is the latest iteration of CenterPOS, a family of point-of-sale malware that researchers have been tracking for several months. CenterPOS has been seen infecting PoS devices…
Read More →