Mobile Security

Mobile Security news, analysis, research, how-to, opinion, and video.

mobile security data protection [Thinkstock]
mobile device management

mobile security phones

Five new threats to your mobile device security

Cyber criminals are stepping up their attacks on mobile devices with new weapons and variations on old ones.

mobile device management

Is your cellphone number just as valuable as your social security number?

Recent news coverage has touted that cell phone numbers are just as valuable to hackers and identity thieves as Social Security Numbers. But, that's not the case at all.

pokemon go pikachu

What is gamification? Lessons for awareness programs from Pokemon Go

Gamification is a way to reward people for exhibiting a desired behavior. It is not merely creating a game for people to play, nor making training a game. As Pokemon Go turns a year old, here are some of the things awareness programs...

Mobile security

SandBlast Mobile simplifies mobile security

Check Point's SandBlast Mobile fits in between mobile device managers and security event log analyzers, and actually makes it easier to manage the overall security footprint of your entire mobile device fleet.

The Internet of Identities (IoI)

IoT, mobility, cloud and pressing security needs mean that every node must have a trustworthy identity and a secure path to network services.

nordvpn

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN has discounted their popular VPN software 72%. Use our link and see the discount applied when you click "buy now".

peeling back good times ahead bright future

Imagining frictionless authentication

Passwords are lame. The username/password combination is outdated and is now the weakest link in security. There's got to be a better way, right?

cybersecurity

How quantum computing increases cybersecurity risks

Quantum computers are expected to arrive within nine years, and organizations better have quantum-safe security if they want to keep their data safe.

galaxy s8 iris2

Hackers trick iris scanner to unlock Samsung Galaxy S8

Chaos Computer Club easily broke Samsung's Galaxy S8 iris recognition authentication. Same hack could unlock the Samsung Pay mobile wallet.

Intel logo

Intel concerned about name of John McAfee’s privacy phone

Intel has told a court that MGT Capital Investments has gone ahead with the announcement of the “John McAfee Privacy Phone,” even though the company that proposes to change its name to “John McAfee Global Technologies” has previously...

dirty numbers playground

Cybersecurity market research: Top 15 statistics for 2017

cybersecuity market statistics

black man phone cafe upset

Users have little confidence their company can protect their mobile device

A survey sponsored by Check Point found that 64 percent of respondents are doubtful that their organization can prevent a mobile cyberattack. What can be done to combat that?

security tools intro slide

9 security tools for the mobile worker

From a webcam cover and laptop lock to a USB port blocker and an encrypted flash drive, we've found some security- and privacy-centered gadgets you will want to keep handy.

iot security ts

Michael Raggo joins 802 Secure as chief security officer

Mobile and Internet of things security expert Mike Raggo will play a key role in product development.

mri scanner

Medical devices that could put you at security risk

You remember the talk about former Vice President Dick Cheney's pace maker being susceptible to hackers, but here is a list of some lesser known medical devices that can scare the life out of you.

p1170405

Companion mobile app exposed Hyundai cars to potential hijacking

The mobile application that accompanies many Hyundai cars exposed sensitive information that could have allowed attackers to remotely locate, unlock and start vehicles.

binoculars desert

Cybersecurity companies to watch

CBInsights created a list of startups that its metrics showed has early-to mid-stage high-momentum companies pioneering technology with the potential to transform cybersecurity. 

mobileye collision avoidance

Security M&A: Intel parks in the collision avoidance space for $15 billion

Intel acquires mobileye, Apple and Cisco cybersecurity acquisitions

Load More