<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p>The threat landscape is ever changing, in Q1 of 2017 alone, mobile ransomware attacks increased <a href="http://www.techrepublic.com/article/report-mobile-ransomware-attacks-soared-in-2017-up-250-in-q1/" style="font-family: sans-serif; font-size: 12.1612px; background-color: transparent;">250%</a><span style="color: #545454; font-family: sans-serif; font-size: 12.1612px; background-color: transparent;">. Mobile devices are an inseparable part of our life, making these valuable and vulnerable targets. As with any technology we use, ThreatSTOP is creating new ways to defend our customers.</span></p> <!--more--><p><span style="color: #545454; font-family: sans-serif; font-size: 12.1612px; background-color: transparent;"><img src="https://info.threatstop.com/hubfs/Sec%20Logo%20with%20tm%20(2).png" alt="Sec Logo with tm (2).png" width="320" style="width: 320px; margin: 0px auto 10px; display: block;"></span></p> <p>While the increase in threats wasn’t quite as heavy in Q2 of 2017, Kaspersky Lab still issued a report on the state of mobile security and <a href="https://securelist.com/it-threat-evolution-q2-2017-statistics/79432/">IT threat evolution for Q2 2017</a>. In which it notes that attackers are increasingly targeting mobile devices, specifically those running Android.</p> <p>To defend against mobile threats, ThreatSTOP’s research team is happy to announce the creation of two new targets:</p> <ul> <li><strong>TS Originated</strong> – <strong>Mobile Threats - (IPs / Domains)</strong> – These are ThreatSTOP’s internally created targets with data manually researched and validated by the ThreatSTOP research team. These lists are only available in <strong>Expert</strong> mode for ThreatSTOP users.</li> <li><strong>TS Curated</strong> – <strong>Mobile Threats - (IPs / Domains)</strong> – These are curated targets containing multiple sources of mobile malware compiled from ThreatSTOP’s own lists (thus including the “TS Originated – Mobile Threats” list mentioned above), as well as those gathered from the security industry. These targets are available in both <strong>Expert</strong> and <strong>Standard</strong> ThreatSTOP modes.</li> </ul> <p>While these targets do not offer protection when a mobile device is outside of your secured network, they will secure mobile devices that are tied into – and using – a company’s Wi-Fi network, provided that ThreatSTOP is enabled. This will allow you to detect compromised devices and begin the task of securing them from further damage to your company.</p> <p>Enabling <strong>Mobile Threats</strong> targets in policies for ThreatSTOP DNS and IP Defense Services protect against<strong> threats to mobile devices connected to your secured network</strong>. If you do not have a ThreatSTOP account,&nbsp;<span>&nbsp;</span>for a free trial.</p> <p>If you do have a ThreatSTOP account, instructions to add targets to a <a href="http://dochub.threatstop.com/display/TS/ThreatSTOP+DNS+Firewall#ThreatSTOPDNSFirewall-DNSFWPolicy">DNS</a> or <a href="http://dochub.threatstop.com/display/TS/ThreatSTOP+IP+Firewall">IP</a> Firewall policies are available on the ThreatSTOP Documentation Hub. Or contact our&nbsp;&nbsp;team.</p></span>