Mobile Security

Mobile Security news, analysis, research, how-to, opinion, and video.

Apple iOS 8 on the iPhone
chip and pin credit card

ss apple iphone evolution carousel 100412891 orig

Here are the limits of Apple's iOS 8 privacy features

The privacy improvements in the latest version of Apple's mobile operating system provide necessary, but limited, protection to customers, experts say.

android encryption

Google to turn on encryption by default in next Android version

Law enforcement would have to approach a device's owner since the encryption keys are stored on the device

Going rogue: Hidden cell towers found

A quick drive around Washington DC found 15 rogue cell phone towers.

cell tower

Rogue cell towers discovered in Washington, D.C.

After initially discovering more than a dozen rogue cell towers in the U.S., ESD America and IntegriCell discovered more questionable towers in the nation's capitol, 15 of them to be exact. Ownership remains unknown, but Tuesday's...

wipe

Is a remote-wipe policy a crude approach to BYOD security?

While the capability to remotely wipe data from lost or stolen mobile phones may help CIOs sleep at night, it may be an outdated approach to BYOD security.

hijacked

Many Android devices vulnerable to session hijacking through the default browser

The default browser in older, widely used versions of Android contains a vulnerability that can be used to bypass the same-origin policy

iphone6

Quick tips before you switch to a new iPhone

Millions of people are switching to the latest iPhone this week. But before you trade-up, here's some basic tips to help protect your new device, both at home and at the office.

colorful apps

Data protection authorities find privacy lapses in majority of mobile apps

One in three applications request excessive permissions, and privacy information is inadequate in 85 percent of them, a study found

grindr logo

Grindr vulnerability places men in harm's way

Grindr, a dating application that caters to gay and bisexual men, could be placing them at risk; and in at least one case, has helped authorities enforce anti-gay agendas by taking advantage of the service's geo-location...

Blackphone SSL security flaw was patched within days, says CEO

We responded quickly, says firm after researchers found issue

ss apple iphone evolution carousel 100412891 orig

Security questions you should ask about Apple Pay

Security pros reacted positively to Apple Pay, but withheld their full endorsement until the mobile payment system could be tested outside of the company’s laboratories.

young man talking on a mobile phone

‘Can everyone hear me now?’

Voice interception of mobile calls is an invisible security hole that isn’t getting enough attention.

mobile security

Why giving mobile apps banking info isn't as risky as it seems

Big name apps like Uber and Venmo may be putting some users ill at ease by requiring payment card information in order to function, but experts say the risk is relatively low

malware primary 100369041 orig

Google, Facebook ID codes found in Android malware stash

Research on Android malware called KorBanker has uncovered a treasure trove of text messages that include authentication codes for Google and Facebook and VPN passwords.

iPhones, iPads ripe for the picking

USENIX Security Symposium: Georgia Tech researchers show how PC botnets could infect iOS devices to steal passwords.

android malware

Android app ambush: Researchers successfully hack Gmail 9 times out of 10

It sounds like a pretty ominous security exploit, but it sure doesn't look easy to pull off

NIST taking input for mobile security guidelines

A new NIST publication aims to alert enterprises of potential security dangers within commercial apps

mobile security

Researchers build security framework for Android

University researchers have modified the Android operating system to let developers plug in enterprise-class security enhancements that would normally require overhauling a mobile device's firmware.

Load More