Mobile Security

Mobile Security news, analysis, research, how-to, opinion, and video.

samsung pay

ipad security

Apple’s new two-factor authentication bumps up security and ease of use

Apple is slowly rolling out a revised system to let you use a second factor with iCloud and other services that use an Apple ID.

150817 google marshmallow 07

Google patches second round of Stagefright flaws in Android

Google has issued patches for two new Stagefright-related software vulnerabilities, one of which affects Android versions going back to 2008 and puts millions of users at risk.

mobile smartphone hands user

Mobile security: iOS vs. Android vs. BlackBerry vs. Windows Phone

Android Marshmallow and iOS 9 add new tricks to the MDM arsenal, especially for app management

cloud data center

Security risks increase as cloud data centers change

Change is always risky. Fast change is even riskier, leaving less time for change management and checks on changed technologies.

Tmobile SIM card

T-Mobile US says Experian breach exposed 15M customers

On Thursday, T-Mobile US T-Mobile CEO, John Legere, said that the names, addresses, Social Security numbers, birthdays, and ID information on more than 15 million customers has been compromised after a breach at Experian.

Android character at MWC

New Android vulnerabilities put over a billion devices at risk of remote hacking

Newly discovered vulnerabilities in the way Android processes MP3 and MP4 files can allow attackers to compromise devices by tricking users to visit specifically-crafted Web pages.

rotten apple

Is Apple's walled garden showing signs of erosion?

A rudimentary malware attack that infected hundreds of iOS apps before Apple caught on puts a spotlight on security and brings into question the market perception that Apple's platform and devices are inherently safer than rivals'...

Internet of things nest stoplights traffic IoT cameras

Why CIOs should worry about the Internet of Things

The Internet of Things brings with it the promise gee-whiz applications and life-changing innovation. But one thing’s for sure – there are as many questions as there will be gigabytes of data being poured into your data centers.

Microsoft IoT Pack for Raspberry Pi 2

Microsoft's enterprise-grade security is coming to Windows 10 IoT

Microsoft launched a new Preview build for its version of Windows 10 that's designed to run devices that are part of the Internet of Things, along with a development kit to help users test it out.

ios9 iphone6

Hack iOS 9 and get $1 million, cybersecurity firm says

Zerodium, an exploit acquisition company, promises to pay $1 million to researchers who provide it with an exclusive, browser-based and untethered jailbreak for the latest Apple iOS 9 operating system.

mobile congress

US Congress members urged to communicate using encrypted apps

Congress members and staff are being urged by a civil rights group to use encrypted smartphone apps such as WhatsApp and Signal rather than traditional cellular networks.

Sectra Communications Tiger/R

Samsung teams with Sectra to secure mobile phones for governments

Sectra is working with Samsung to integrate its end-to-end hardware encryption system with the phone maker's Knox mobile security platform to create devices secure enough to carry government secrets.

man texting

5 ways to shore up security in your BYOD strategy

Despite years in the making, many security leaders are still wary about BYOD policy. Here are five ways to combine security and privacy with the ever-increasing demand for user-owned devices in the enterprise.

break iphone crack broken

iOS 9 breaks VPNs, prevents server access for many

Cisco AnyConnect and other VPNs may or may not work for your servers, as Apple breaks split-tunnel compatibility

Apple brings down apps, mainly Chinese ones, with malware

Apple brings down malware-infected apps from store

Apple has brought down a large number of apps from its store after it was found that around 40 iOS apps had been infected by a modified version of the company's software for developers.


Windows devices account for 80% of malware infections transmitted via mobile networks

Microsoft may have just a single-digit slice of the mobile market, but there's one segment of mobile it's winning: Malware infections delivered via mobile networks.

identity theft

Identity theft in the enterprise

Identity theft, historically considered a consumer threat, is expanding its horizons. Looking for bigger game, attackers are targeting the enterprise with similar tactics used to hijack online and financial accounts belonging to...

xerox printed memory 20 bit memory label

Xerox introduces printed-memory labels to fight counterfeiting

Xerox's printed label contains 36 bits of rewritable memory that can store up to 68 billion points of data to determine if a product is genuine, among other things.

Load More