ILTA Webinar, Dec. 10th: Data Loss Prevention on Mobile with Seth Hallem

Mobile devices are constantly transacting with sensitive corporate data. Historically, most of that traffic is emails and email attachments. Increasingly, attorneys want to do more on their mobile devices, including annotating and editing documents. Much time and energy has been invested in DLP on the desktop, but what is the state of the art in mobile?

Continue reading

Secure Email is Cracked; What Now?

cracked pixabay rotated broken-glass-2208593__480

By Seth Hallem, Moble Helix CEO, Co-founder, & Chief Architect

Secure email using S/MIME and OpenPGP is fundamentally broken. Our CEO explains the EFAIL vulnerability and why our LINK Email is not susceptible to EFAIL. What do we do next to protect email? 

On Sunday night, a team of researchers from Germany and Belgium dropped a major bomb on the world of encrypted email by describing a simple, widely applicable, and wildly effective technique for coercing email clients to release encrypted email contents through “Exfiltration channels.”[1] The concept is simple – by using a combination of known manipulation techniques against the encryption algorithms specified in the S/MIME and OpenPGP standards and lax security choices in a wide variety of email clients, the research team was able to intercept and manipulate encrypted emails such that large blocks of the encrypted text are revealed to a malicious server.

What is most brilliant (and most dangerous) about this attack, is that the attack does not require decrypting the email messages or stealing encryption keys. Hence, the attack can be deployed as a man-in-the-middle attack on the infrastructure of the internet itself, rather than requiring that a specific email server or email client is compromised.

The essential idea behind this attack is simple – HTML emails expose a variety of reasons to query remote servers to load parts of those emails. The simplest (and most common) example of this concept is displaying embedded images. Many marketing emails use tiny embedded images to monitor who has opened an email. This technique is so pervasive that many of us have become desensitized to clicking the “Allow images from this sender” prompt in Outlook. It is common practice for marketing emails to contain embedded images with essential content, which encourages users to allow the client to load all images in that message. However, doing so loads both visible images and tiny, single pixel images that marketing tools use to uniquely determine that we have opened the email message in question.

Continue reading

Hacking is a booming business, and it’s time for a disruption – CSO Online

By Mobile Helix CEO and Co-founder, Seth Hallem

Hackers are siphoning billions from the global economy each year by stealing data for profit. However, in spite of this rising threat, enterprises continue to make the same mistakes over and over again. It is time to change our assumptions and to re-think how we protect sensitive data.

Hacking is a booming business. Business has been good for several years now. Data breaches are at all-time highs. Cyber-attacks are skyrocketing, and ransomware is a growing fad. And the best news of all is that the same old tricks (see XSS, SQL Injection, SPAM ….) are still working just as well as they always have. How is it possible that a business that was estimated to cost the global economy $450 billion dollars is continuing to grow? That is a lot of money diverted to criminals in lieu of legitimate participants in our global economy.

Continue reading

What CISOs must learn from Bitcoin and a research team at Georgia Tech

By Seth Hallem, originally published in HelpNetSecurity, Sept. 16, 2013

It has been an eventful time in the mobile world with two recent breaking stories revealing vulnerabilities in the security infrastructure for Android and iOS respectively. While vastly different in their nature, both point to a fundamental lesson that CISOs in an increasingly mobile world cannot ignore – when it comes to encryption, read the fine print. Otherwise you may find yourself up the proverbial creek without a paddle (i.e., remediation strategy).

Continue reading

Appthority: Top Blacklisted iOS & Android Apps

This brief article from Help Net Security, Top blacklisted Android and iOS apps by enterprises caught my eye this morning. The piece highlights a portion of the data from the new Appthority 3Q ’17 Enterprise Mobile Security Pulse Report, which you can download for free.

The Help Net Security article cites the apps blacklisted by enterprises for iOS and for Android, their “Risk Score” and the “Risk Driver.”  IT professionals should take note, not only of the blacklisted apps but of the associated risks.

Appthority_3Q17_Top_10_BL_iOS_Apps

Continue reading

Mobile Helix Partners with PSPDFKit to Provide Secure PDF Annotation to the LINK App

Lawyers receive, annotate, and share documents using a single encrypted app.

Today at ILTACON 2017 you can see our new in-app annotation in LINK 3.3.

MH-iPad14-Annotation

 

Lawyers can quickly annotate a document receive via email or a document stored in iManage Work® and NetDocuments® DMS. Then email the annotated document or check it into DMS with LINK 3.3.

 

“With the addition of PDF annotation, LINK now provides the industry’s broadest complement of workflows for lawyers on mobile devices,” Seth Hallem, CEO and Co-founder of Mobile Helix. “LINK workflows, whether annotating, editing, or comparing documents, ensure security and control of documents. Clients are imposing tougher security requirements on law firms. Our goal is to provide law firms with stringent security while making it easy for lawyers to get work done with LINK.”

Continue reading

Mobile Helix Announces the Release of LINK 3.3 with Local Edit and Digital Rights Management

We are thrilled to unveil our new LINK 3.3 release at ILTACON 2017.

What’s new in LINK 3.3

  • Local edit using the Microsoft Word app
  • Option to send a document using iOS Mail
  • Ability to read an NRL link in iOS Mail
  • Integration with Azure AD Information Rights Management
  • Secure in-app PDF annotation
  • Lighter, faster User Interface

Continue reading