Mobile Security Talkhttp://www.blogtalkradio.com/mobilesecurityTune in to Mobile Security Talk, sponsored by Lacoon Mobile Security. Learn about the latest Enterprise mobile security threats, news and tips to keep devices and enterprise data secure.enBlogTalkRadio.com. All Rights Reserved.Fri, 14 Jun 2019 19:30:00 GMTTue, 12 Aug 2014 14:30:00 GMTSoftwareBlogTalkRadio Feed v2.0https://dasg7xwmldix6.cloudfront.net/hostpics/d7b77a57-0db8-449b-b54e-43ae94c3907c_mg.jpgMobile Security Talkhttp://www.blogtalkradio.com/mobilesecurityTune in to Mobile Security Talk, sponsored by Lacoon Mobile Security. Learn about the latest Enterprise mobile security threats, news and tips to keep devices and enterprise data secure.feeds@blogtalkradio.comBlogTalkRadio.comsoftware,mobile,mobile security,advanced threats,android,androidos,baby panda,byod,ecosystem,fragmentationMobile Security TalknoTune in to Mobile Security Talk, sponsored by Lacoon Mobile Security. Learn about the latest Enterprise mobile security threats, news and tips to keep devices aepisodicAre Malicious Configuration Profiles iOS' Achilles Heel?http://www.blogtalkradio.com/mobilesecurity/2014/08/12/are-malicious-configuration-profiles-ios-achilles-heelSoftwarehttp://www.blogtalkradio.com/mobilesecurity/2014/08/12/are-malicious-configuration-profiles-ios-achilles-heel/#commentshttp://www.blogtalkradio.com/mobilesecurity/2014/08/12/are-malicious-configuration-profiles-ios-achilles-heelTue, 12 Aug 2014 14:30:00 GMTAre Malicious Configuration Profiles iOS' Achilles Heel?The Lacoon Mobile Security Research team has been doing ongoing research into the subject of Malicious iOS Configuration Profiles for quite some time. To share this research, we are interviewing one of the senior security researchers at Lacoon Mobile Security, Dan Koretsky. We asked Dan to give some background data on iOS configuration profiles as well as discuss the potential threats to enterprises. Dan also provides us with methods that enterprises can take to mitigate the threats posed by malicious iOS configuration profiles. iOS Configuration Profiles are small files that can be installed on all iOS devices. They are essentially instruction and permission lists that can alter many settings, including network configurations and security settings. They’re used by everyone - from cell providers for their releasing their settings to thousands of enterprises for managing devices accessing the corporate network . Their use is officially approved by Apple and there is nothing innately malicious about any given profile. But, if implemented by threat actors, iOS configuration profiles can enable them to obtain usernames and passwords as well as allow access to secure corporate networks and private communications.     00:05:00Mobile Security TalknoThe Lacoon Mobile Security Research team has been doing ongoing research into the subject of Malicious iOS Configuration Profiles for quite some time. To shareA Practical Mobile Security Attack against VDI Solutionshttp://www.blogtalkradio.com/mobilesecurity/2014/08/04/a-practical-mobile-security-attack-against-vdi-solutionsSoftwarehttp://www.blogtalkradio.com/mobilesecurity/2014/08/04/a-practical-mobile-security-attack-against-vdi-solutions/#commentshttp://www.blogtalkradio.com/mobilesecurity/2014/08/04/a-practical-mobile-security-attack-against-vdi-solutionsMon, 04 Aug 2014 13:30:00 GMTA Practical Mobile Security Attack against VDI SolutionsAs a precursor to Lacoon Mobile Security's upcoming presentation at Blackhat 2014, we interivew Daniel Brodie, a Sr. Security Researcher at Lacoon to discuss some of the vulnerabilities that exist in Virtual Desktop Infrastructure (VDI) frameworks, as well as provide some insights into the implications of using VDI in your enterprise.   Daniel explains how while VDI solutions are certainly a beneficial tool to protect enterprises against device theft, they don’t provide protection against targeted threats such as mobile Remote Access Trojans (mRATs) and Man-in-the-Middle. In fact, as he shows in the research, threats against the underlying VDI platform are fairly easy to carry out by using widely-distributed free tools. The podcast goes over the main topics that he’ll present at Blackhat, including the methods of research, potential threats and best practices that enterprises should follow. 00:09:00Mobile Security TalknoLacoon,VDI,MDM,malware,MiTMAs a precursor to Lacoon Mobile Security's upcoming presentation at Blackhat 2014, we interivew Daniel Brodie, a Sr. Security Researcher at Lacoon to discuss soIs Android Fragmentation making the OS as fragile as glass?http://www.blogtalkradio.com/mobilesecurity/2014/07/02/is-android-fragmentation-making-the-os-as-fragile-as-glassSoftwarehttp://www.blogtalkradio.com/mobilesecurity/2014/07/02/is-android-fragmentation-making-the-os-as-fragile-as-glass/#commentshttp://www.blogtalkradio.com/mobilesecurity/2014/07/02/is-android-fragmentation-making-the-os-as-fragile-as-glassWed, 02 Jul 2014 18:00:00 GMTIs Android Fragmentation making the OS as fragile as glass?What is Android fragmentation and how does it affect the mobile security of the Android-based devices? In this Mobile Security Talk episode, Dan Koretsky, sr. security researcher at Lacoon Security, provides us a brief overview of Android fragmentation and its security implications.  00:09:00Mobile Security Talknomobile,security,mobile security,Android,FragmentationWhat is Android fragmentation and how does it affect the mobile security of the Android-based devices? In this Mobile Security Talk episode, Dan Koretsky, sr. sUnflod Baby Panda - iOS 7 Mobile Malware Can Steal Apple IDshttp://www.blogtalkradio.com/mobilesecurity/2014/06/15/unflod-baby-panda--ios-7-mobile-malware-can-steal-apple-idsSoftwarehttp://www.blogtalkradio.com/mobilesecurity/2014/06/15/unflod-baby-panda--ios-7-mobile-malware-can-steal-apple-ids/#commentshttp://www.blogtalkradio.com/mobilesecurity/2014/06/15/unflod-baby-panda--ios-7-mobile-malware-can-steal-apple-idsSun, 15 Jun 2014 04:00:00 GMTUnflod Baby Panda - iOS 7 Mobile Malware Can Steal Apple IDsIn this Lacoon Mobile Security Podcast series, Dan Koretsky, Sr Security Researcher and Strategist discusses the new strain of iOS mobile malware called "Unflod Baby Panda." Listen to learn more about this new mobile security malware, how a device can be infected and how to mitigate and remove the malware from your device.  To stay on top of the latest in mobile security news, subscribe to the Mobile Security Talk channel and check out the Lacoon Mobile Security blog at http://www.lacoon.com/blog/ .      00:05:00Mobile Security Talknomobile security,baby panda,unflod baby panda,mobile malware,mobile threatIn this Lacoon Mobile Security Podcast series, Dan Koretsky, Sr Security Researcher and Strategist discusses the new strain of iOS mobile malware called "Unflod