Mobile Security

Mobile Security news, analysis, research, how-to, opinion, and video.

whisper
ios threats

symantec logo

Analysts react to Symantec split announcement

On Thursday, Symantec said that it would separate into two business units; one that focuses entirely on security, while the other sticks to information management. Symantec's announcement follows similar ones from Hewlett-Packard and...

Four-digit passcodes remain a weak point in iOS 8 data encryption

Longer passwords would be more resistant to brute-force attacks

keyboard app security

Alternate keyboard apps: Too risky for your smartphone?

Alternative keyboard apps are just one glaring example of how protecting your privacy requires diligence.

android browser

Android browser flaw found to leak data

A security researcher has found another flaw in the Android browser that a cybercriminal could use to steal sensitive data.

Typing on tablet

Is that used iPad actually stolen? Apple creates tool for would-be buyers to check

The tool will help prospective buyers of used iPhones and iPads to determine if the devices were lost or stolen

Hong Kong protest

Malware program targets Hong Kong protesters using Apple devices

The program is related to an Android one that seeks to spy on activists, Lacoon Mobile Security said

Apple iOS 8 on the iPhone

iPhone 6 fingerprint scanner found accurate enough for Apple Pay

Apple's iPhone 6 fingerprint scanner has a level of accuracy that makes it a solid authentication tool for people planning to use the smartphone in place of a credit card for in-store purchases, research shows.

chip and pin credit card

Chip and PIN: No panacea, but worth the effort – and the cost

The U.S. has lagged behind the rest of the world in credit card security for two decades. But there is still an ongoing debate about whether a multibillion-dollar move to chip and PIN technology will be worth the cost and effort, or...

ss apple iphone evolution carousel 100412891 orig

Here are the limits of Apple's iOS 8 privacy features

The privacy improvements in the latest version of Apple's mobile operating system provide necessary, but limited, protection to customers, experts say.

android encryption

Google to turn on encryption by default in next Android version

Law enforcement would have to approach a device's owner since the encryption keys are stored on the device

Going rogue: Hidden cell towers found

A quick drive around Washington DC found 15 rogue cell phone towers.

cell tower

Rogue cell towers discovered in Washington, D.C.

After initially discovering more than a dozen rogue cell towers in the U.S., ESD America and IntegriCell discovered more questionable towers in the nation's capitol, 15 of them to be exact. Ownership remains unknown, but Tuesday's...

wipe

Is a remote-wipe policy a crude approach to BYOD security?

While the capability to remotely wipe data from lost or stolen mobile phones may help CIOs sleep at night, it may be an outdated approach to BYOD security.

hijacked

Many Android devices vulnerable to session hijacking through the default browser

The default browser in older, widely used versions of Android contains a vulnerability that can be used to bypass the same-origin policy

iphone6

Quick tips before you switch to a new iPhone

Millions of people are switching to the latest iPhone this week. But before you trade-up, here's some basic tips to help protect your new device, both at home and at the office.

colorful apps

Data protection authorities find privacy lapses in majority of mobile apps

One in three applications request excessive permissions, and privacy information is inadequate in 85 percent of them, a study found

grindr logo

Grindr vulnerability places men in harm's way

Grindr, a dating application that caters to gay and bisexual men, could be placing them at risk; and in at least one case, has helped authorities enforce anti-gay agendas by taking advantage of the service's geo-location...

Blackphone SSL security flaw was patched within days, says CEO

We responded quickly, says firm after researchers found issue

Load More