Mobile Security

Mobile Security news, analysis, research, how-to, opinion, and video.

peeling back good times ahead bright future
nordvpn

Intel logo

Intel concerned about name of John McAfee’s privacy phone

Intel has told a court that MGT Capital Investments has gone ahead with the announcement of the “John McAfee Privacy Phone,” even though the company that proposes to change its name to “John McAfee Global Technologies” has previously...

dirty numbers playground

Cybersecurity market research: Top 15 statistics for 2017

cybersecuity market statistics

black man phone cafe upset

Users have little confidence their company can protect their mobile device

A survey sponsored by Check Point found that 64 percent of respondents are doubtful that their organization can prevent a mobile cyberattack. What can be done to combat that?

security tools intro slide

9 security tools for the mobile worker

From a webcam cover and laptop lock to a USB port blocker and an encrypted flash drive, we've found some security- and privacy-centered gadgets you will want to keep handy.

iot security ts

Michael Raggo joins 802 Secure as chief security officer

Mobile and Internet of things security expert Mike Raggo will play a key role in product development.

mri scanner

Medical devices that could put you at security risk

You remember the talk about former Vice President Dick Cheney's pace maker being susceptible to hackers, but here is a list of some lesser known medical devices that can scare the life out of you.

p1170405

Companion mobile app exposed Hyundai cars to potential hijacking

The mobile application that accompanies many Hyundai cars exposed sensitive information that could have allowed attackers to remotely locate, unlock and start vehicles.

binoculars desert

Cybersecurity companies to watch

CBInsights created a list of startups that its metrics showed has early-to mid-stage high-momentum companies pioneering technology with the potential to transform cybersecurity. 

mobileye collision avoidance

Security M&A: Intel parks in the collision avoidance space for $15 billion

Intel acquires mobileye, Apple and Cisco cybersecurity acquisitions

1 app hacked

How to prevent your mobile app from getting hacked

TriviaCrack may be addicting to users, but criminals are hooked on getting your personal information from other apps you use

thinkstock privacy please

FCC privacy ruling could leave enterprises' data vulnerable

The recent repeal of new FCC rules designed to strengthen personal privacy among consumers by limiting the uses ISPs can make of their personal data also has implications for companies who use these services. Security and privacy...

smarthub

What home products are most susceptible to cyber burglars?

In the matter of the Dyn situation, it was those Internet of Things devices that created the voluminous distributed denial of sevice attack. A DVR was used to attack Dyn’s network. To reduce the impact of such attacks, officials at...

apple watch

10 security risks of wearables

Fitness trackers may not present a huge security risk, but any connected device can be hacked. Here’s what you need to know to minimize those security and privacy threats.

information security threat primary4

9 biggest information security threats through 2019

Each year, the Information Security Forum, a nonprofit association that researches and analyzes security and risk management issues, releases its 'Threat Horizon' report to provide a forward-looking view of the biggest security...

smartphones 2013

Study finds devices are not wiped properly

The National Association for Information Destruction (NAID) found in a recent study that 40 percent of the devices that bought from secondhand markets had PII on them.

android security

Most Android devices lack latest security patches

Nearly three-quarters of Android devices on the five biggest U.S. carriers are running on security patches that are at least two months old, putting them at greater risk of being hacked.

thunderbolt ethernet adapter

Newly leaked documents show low-level CIA Mac and iPhone hacks

The U.S. CIA has had tools to infect Apple Mac computers by connecting malicious Thunderbolt Ethernet adapters to them since 2012, according to new documents purported to be from the agency and published by WikiLeaks.

burlap money bag

Enterprises misaligning security budget, priorities

Those on staff who are doing the budgeting might blindly write the same amount into the security line every year. Or the C-suite might handcuff the security personnel with a tight budget that doesn’t allow for expansion into new...

Load More