Higher education institutions work constantly to build smarter campuses. These advances tend to focus on digital transformation and overall more accessible, user-friendly resources to enable the academic experience from any device, anywhere. Colleges strive to be a big, fun, stimulating, shared macrocosm: the place to learn together and share knowledge and unique … [Read more...]
CRN Names WatchGuard AuthPoint One of 2020’s Coolest Mobile Device Management and Security Products
Once again, CRN has recognized WatchGuard in its Mobile 100 list of the top mobile devices, security and device management, software and mobile app development platform vendors in the market today. That’s five years running! This year, CRN highlighted WatchGuard’s AuthPoint multi-factor authentication (MFA) solution as one of its 25 Coolest Mobile Device Management And Security … [Read more...]
How to Spot Spoofed or Phishing Emails on Your Mobile Device
Full disclaimer: spotting spoofed or phishing emails on a mobile device like a cell phone or a tablet isn’t as straightforward as on a laptop or desktop. As you’ll see shortly, mobile clients can hide a lot of the telltale signs of a phish. This post will use a spoofed email claiming to be from our CTO Corey Nachreiner, sent to Trevor and myself, with Marc cc’d. The main focus … [Read more...]
Android APK Reverse Engineering: Using JADX
In continuation of the Android APK Reverse Engineering series, this post will cover how to actually start digging into an APK’s programming logic. My last blog post detailed how to unzip an APK archive and what contents are within. While it’s useful to an extent, it’s not helpful in reading and understanding the programming logic. Remember the code itself is in binary format … [Read more...]
WIBattack, Simjacker’s Sibling
If the announcement of Simjacker wasn’t startling enough, yet another SIM-based vulnerability has been released – and it’s been known for four years! Ginno Security Laboratory, a non-profit security research organization, claims to have discovered both [email protected], which is the name they dubbed Simjacker (which is what AdaptiveMobile Security named the exploit), as well as the … [Read more...]