Blue Coat Security Report
Businesses are challenged to keep pace with the proliferation of mobile devices and maintain control over them. This report examines the mobile threat landscape and behavioral patterns that lead to data loss, malicious applications, fraud and other mobile threats.
Download the Blue Coat 2013 Mobile Malware Report
Security Report Archive
2012 Blue Coat Malnet Report | Updated 2012 | |
2012 Blue Coat Security Report | Updated 2012 | |
2011 Blue Coat Security Report | Updated 2011 | |
2009/2010 Blue Coat Security Report | Updated 2010 |
The Latest from Our Security Blog
Malvertising Quick Look: Forbes.com
February 18, 2013 - By Chris Larsen
[Disclaimer: This analysis deals largely with circumstantial evidence, for reasons laid out in the introductory blog post to this series. Any conclusions are preliminary, and subject to change based on further research.]
Grab Your Trenchcoat! It's "MalNet - A Detective Story"
February 8, 2013 - By Chris Larsen | Co-Authored By An Analyst Who Wishes to Remain Anonymous
[It seems one of our Analysts has been watching too many old-time cop shows, and sees himself as a hard-boiled detective, hot on the trail of the Bad Guys. I know who "Donovan" is, and would say he's more "lightly sauteed" than hard-boiled... I haven't figured out who "Badger" and "Dirk" are, but I'm working on it. Queue the "Dragnet" theme music! --C.L.]
NOTE: The names in this story have been changed to protect the identities of those involved, but the events are described as they actually occurred…for the most part. ;)
Phishing, The Overlooked Mobile Threat
February 5, 2013 - By Tim Chiu
Most people associate phishing threats with emails, but really it's a web security threat. It may start by receiving an email, one that's made to look like it's from a company or service you normally deal with on a regular basis.
Security Blog Archive