Mobile Security

Mobile Security news, analysis, research, how-to, opinion, and video.

honda ridgeline interior
01 branches

lock keyboard

No more ransomware?

A new project holds out hope in the war against ransomware attacks.

android figurine

Sensitive access tokens and keys found in hundreds of Android apps

A new study performed by cybersecurity firm Fallible on 16,000 Android applications revealed that around 2,500 had API keys and access tokens for third-party services hard-coded into them.

android privacy

How to set up your Android phone for ultimate privacy

Here's how to replace all of those data-hungry apps and services with ones that don't need to know so much about you.

FTC website

FTC goes after D-Link for security problems

The Federal Trade Commission (FTC) filed a complaint on Thursday against Taiwan’s D-Link and its U.S. subsidiary, D-Link Systems, Inc., alleging the company has put consumer privacy at risk with inadequate security measures.

nordvpn

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

NordVPN has discounted their popular VPN software 72%. Use our link and see the discount applied when you click "buy now".

wearable smart watch

Data breaches through wearables put target squarely on IoT in 2017

Security needs to be baked into IoT devices for there to be any chance of halting a DDoS attack, according to security experts.

01 online cart

Best and worst online retailers for security

Now that the shopping is done, let's take a look at who made the naughty or nice list for security practices

01 upright

How to make sure your data doesn’t crash and burn

10 tips to protecting your data while in-flight.

privacy eye look

Looking back at privacy in 2016

Trevor Hughes, president & CEO of the International Association of Privacy Professionals (IAPP), recaps the top privacy stories of 2016.

iphone security

Switch from Yahoo Mail to Gmail, and turn your phone into a physical key

Yahoo suffered the world's biggest hack on 1 billion users. Google is the safest choice for personal email.

Computerworld's Smart Cities video tour - Singapore [December 2016]

Singapore’s ‘city brain’ project raises concerns about privacy?

A centralized command center that aggregates sensor data on traffic, weather, government and elder services sounds great – but also, to private citizens, a little unsettling.

thieving magpie

U.S. and U.K. spy agencies have been intercepting in-flight phone calls for years

U.S. and U.K. spy agencies have been monitoring in-flight mobile phone users for years, according to new revelations from the trove of documents leaked by former NSA contractor Edward Snowden.

false identity

Solve cybercrime by permanently linking physical space and cyberspace

A discussion of how to dramatically reduce cybercrime, cyber-terrorism, and cyber-espionage by using biometric credentials for internet transactions.

man person clouds tablet

Security pros most worried about clouds, mobile

Companies were least prepared to assess the security risks of cloud and mobile technologies, according to a survey of cybersecurity professionals released this morning. Overall, the confidence levels of security professionals that...

fbi trump iphone

A year after terrorist attacks, phone privacy laws unchanged – but watch out for Trump

Although the perpetrators of the San Bernardino mass shooting were killed in a gun battle with law enforcement within hours of the attack, the FBI’s interest in one terrorist’s iPhone precipitated a public standoff with Apple that...

growth money time plants

Security budgets continue to grow, but is it enough?

Cybersecurity is now a top concern for businesses, but the reality is that it should have been on their radar years ago. Why did businesses wait so long to invest in cybersecurity?

07 insider

Unwitting attacks from the inside

Employee involvement top causes of most expensive breaches

tel aviv city hall

Hacker shows how easy it is to take over a city’s public Wi-Fi network

An Israeli hacker found a vulnerability in routers that could have allowed him to take over the public Wi-Fi network of an entire city.

Load More