Mobile Security

Mobile Security news, information, and how-to advice

Small businesses could benefit from wireless industry 'kill switch' plans

Participants like Apple, AT&T, Google, and Verizon Wireless agree to provide "baseline anti-theft tool"

Tools

Your no-fuss, fail-safe guide to protecting Android devices

As Android's popularity continues to climb, it's increasingly joining the workplace. In its early days, Android had little in the way of security, relegating it to personal use. But over the years, Google has upped the ante in terms...


3 ways to reduce BYOD legal liability with the right conversation

As "bring your own device" (BYOD) reshapes the way organizations handle technology, how do we handle the uncertainty of legal liability and security concerns? The key to turning a potential liability into an opportunity lies in having

whatsapp ios

FTC warning unlikely to stop Facebook from changing WhatsApp privacy policies

Despite pressure from the Federal Trade Commission, Facebook is unlikely to leave WhatsApp's stricter privacy policies intact, once government regulators approve the $19 billion acquisition, privacy experts say.

CDW Integrates with Google Apps for Cloud Collaboration

Through a partnership with Google and Esna Technologies, CDW has rolled out native access to the CDW Cloud Collaboration suite within Google Apps.

The Internet of Things: An exploding security minefield

With small, underfunded developers crowding the IoT market, the need for security awareness, education and training is crucial, say Duo Security researchers

Tools

How MDM works – or doesn't work – for SMBs

Not every company is big enough to implement traditional MDM solutions, but the smaller ones are still trying to find ways to manage their corporate data

New Windows Phone security necessary, but not groundbreaking

Windows Phone 8.1 introduced today at the Build developer conference, bringing with it a slew of new security features

Google clarifies commercial spyware ban for Play store

Apps sold on Play store not allowed to track user activity in secret, according to updated developer guidelines

Logicalis eBook: SAP HANA: The Need for Speed

Without timely business insights, organizations today can suffer logistical, manufacturing, and even financial disaster in a matter of minutes

Rogue apps could exploit Android vulnerability to brick devices

The only way to recover from such an attack involves wiping all user data from affected devices, researchers from Trend Micro said

Teen cyberbullying grows with 'anonymous' social chat apps

Apps like Yik Yak, Whisper and Secret offer teens online anonymity, but experts say parents need to remind kids that the promise is bogus

googleglass

Why Google Glass security remains a work in progress

University researchers develop spyware for Glass that snaps pictures and sends them to a remote server

5 ways to prevent data loss in mobile environments

Confidential company data can make its way onto mobile devices, where it's no longer under the protection of your toughest network defenses. Does that make your data vulnerable? To find out, review some strategies for preventing data...

2013 Cyber Risk Report

The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat landscape.

Ransomware attacks to target mobile devices, warns RSA

Business users less likely to be as vulnerable as consumers

UK mobile operators join forces to combat text spam

Mobile phone users can report spam messages by forwarding them to a central service free of charge

Researchers find cross-platform RAT for Windows, Android

Android APK found in WinSpy, suggesting that hackers are seeking cross-platform RATs

Who put the cockroach in my supply chain?

Businesses have always had concerns about supply chain risks but, for most businesses, those risks involve shipping delays, parts shortages and labor issues. But that’s starting to change as evidenced by CSOonline’s recent coverage on

Internet Security Threat Report 2014

The Internet Security Threat Report (ISTR) provides an analysis of the year's global threat activity, based on data from the Symantec™ Global Intelligence Network.

Without proper security measures, smart homes are just begging to be targets

As they stand now, smart devices are exceedingly vulnerable to attack, and it's up to users to keep them from becoming a front door to their entire networks

Forget the endpoints, protect the data

For years the primary focus of security has been securing the endpoints. If we can just protect the desktops and laptops and tablets and smartphones from malicious exploits and prevent them from being compromised, then all would well.

Some Samsung Galaxy devices contain a file access backdoor, Replicant developers say

A software program shipped with some Samsung mobile devices allows access to the file system through the modem, the developers said

Security weakness found in iOS 7

Researcher finds flaw that would allow attackers to exploit OS kernel

Load More