Blackberry

BlackBerry.com

Blackberry
Securing a Connected Future You Can Trust BlackBerry helps organizations defend against cyber threats. Founded in 1984 as Research In Motion (RIM), BlackBerry is now a leader in cybersecurity—helping businesses, government agencies, and safety-critical institutions of all sizes secure the Internet of Things (IoT). BlackBerry products and services include the Cylance AI-based endpoint security solutions, BlackBerry UEM unified endpoint management platform, the BlackBerry AtHoc critical event management solution, and BlackBerry QNX software for secure embedded systems.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

BLACKBERRY ISSUES FOUR SECURITY ADVISORIES FOR BB 10 DEVICES

Infosecurity Magazine | September 11, 2013

news image

“BlackBerry is committed to protecting customers from third-party security issues, and we recommend that all customers apply the latest software updates to protect their devices from these Adobe Flash, Webkit and libexif vulnerabilities,” said Adrian Stone, director of the BlackBerry Security Incident Response and Threat Analysis team, said in a statement....

Read More

BLACKBERRY 10 VULNERABLE TO MITM ATTACK

None | October 15, 2014

news image

BlackBerry is struggling enough in the smartphone wars as it is, but the venerable pocket assistant company has been dealt a blow: a vulnerability around the BlackBerry World app store has been discovered, which would allow spoofing in order to serve up malicious files....

Read More

HOW DID THE RCMP CRACK BLACKBERRY'S SECURITY?

| June 12, 2014

news image

BlackBerry Ltd. has long held that its BlackBerry devices are among the most secure in the world, but it turns out the platform isn’t as bulletproof as many had been led to believe....

Read More

CYBER SECURITY FIRM FINDS 'MULTIPLE VULNERABILITIES' IN TIK TOK SECURITY

abc6onyourside | January 15, 2020

news image

A cybersecurity firm tested the security of Tik Tok and found "multiple vulnerabilities" in the app's code, allowing for security loopholes and hacking accounts. Check Point Research published their findings on the app, showing the security concerns. The firm's research shows they were able to manipulate code to mess with accounts' contents, delete and upload videos without the account owner's consent, make previously "hidden" videos public, and access persona...

Read More
news image

BLACKBERRY ISSUES FOUR SECURITY ADVISORIES FOR BB 10 DEVICES

Infosecurity Magazine | September 11, 2013

“BlackBerry is committed to protecting customers from third-party security issues, and we recommend that all customers apply the latest software updates to protect their devices from these Adobe Flash, Webkit and libexif vulnerabilities,” said Adrian Stone, director of the BlackBerry Security Incident Response and Threat Analysis team, said in a statement....

Read More
news image

BLACKBERRY 10 VULNERABLE TO MITM ATTACK

None | October 15, 2014

BlackBerry is struggling enough in the smartphone wars as it is, but the venerable pocket assistant company has been dealt a blow: a vulnerability around the BlackBerry World app store has been discovered, which would allow spoofing in order to serve up malicious files....

Read More
news image

HOW DID THE RCMP CRACK BLACKBERRY'S SECURITY?

| June 12, 2014

BlackBerry Ltd. has long held that its BlackBerry devices are among the most secure in the world, but it turns out the platform isn’t as bulletproof as many had been led to believe....

Read More
news image

CYBER SECURITY FIRM FINDS 'MULTIPLE VULNERABILITIES' IN TIK TOK SECURITY

abc6onyourside | January 15, 2020

A cybersecurity firm tested the security of Tik Tok and found "multiple vulnerabilities" in the app's code, allowing for security loopholes and hacking accounts. Check Point Research published their findings on the app, showing the security concerns. The firm's research shows they were able to manipulate code to mess with accounts' contents, delete and upload videos without the account owner's consent, make previously "hidden" videos public, and access persona...

Read More

Resources

resource image

Cloud Security

ESG Passwordless in the Enterprise

Whitepaper

resource image

Cloud Security

Securing Remote Access

Whitepaper

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us