Mobile Security

Mobile Security news, analysis, research, how-to, opinion, and video.

panthers nfl cardinals
gavel court trial

150817 google marshmallow 03

Google fixes critical Wi-Fi and media-processing flaws in Android

Google has patched thirteen new vulnerabilities in Android, two of which could allow attackers to take control of Android devices located on the same wireless network, if they have Broadcom Wi-Fi chips.

20151005 Cisco headquarters sign

Cisco patches authentication, denial-of-service, NTP flaws in many products

Cisco Systems has released security patches for flaws affecting a wide range of products, including for a critical vulnerability in its RV220W wireless network security firewalls.

Market Street Wi-Fi splash

Free Wi-Fi is not free from cyber security threats

Security isn't only about knowing what is going on inside the enterprise, but staying abreast of the way technological changes in society impact the threats to cyber security through end users.

linux penguin shoot

Linux zero-day affects most Androids, millions of Linux PCs

A new zero-day vulnerability has been discovered that allows Android or Linux applications to escalate privileges and gain root access, according to a report released this morning by Perception Point.

securitiy concerns

5 biggest cybersecurity concerns facing CIOs, CISOs in 2016

Carl Leonard, a principal security analyst for Raytheon's Websense cybersecurity software unit, offers insight into the most serious threats CIOs and CISOs are likely to grapple with this year.

7 encryption

Defense One: Islamic State has written its own encrypted communications app

The Islamic State is deploying its own encrypted communications app for Android, an eventuality predicted by experts who oppose efforts of governments to require encryption backdoors so they can find out what criminals are saying to...

fitbit wearable

How secure are wearables, anyway?

Whether you're using that new wearable for yourself or managing IT at a company where fit trackers and smart watches are becoming more popular, wearables just might be the next big bullseye for cybercriminals.

cellphone driving texting

Sample cell phone use while driving policy

This sample cell phone usage policy pertains to employees who are on the road. The company, a large association that supports independent fuel distributors, has many employees who travel frequently for business.


Silent Circle patches Blackphone vulnerability

A report released this morning shows that no phone is 100 percent secure -- but that one company, at least, is able to respond quickly and issue patches immediately.

google android nexus6

Google fixes dangerous rooting vulnerabilities in Android

Google has fixed a new batch of vulnerabilities in Android that could allow hackers to take over devices remotely or through malicious applications.

bad news

Can enterprises keep mobile security threats from driving customers away?

By building intelligent IDS/IPS into an app from the ground up, an enterprise can enable apps to be self-defending against any malicious use of their capabilities.

fraud infog primary

The year in security, identify theft and fraud

There’s a lot we can say about cybersecurity, identify theft and fraud in 2015, but we’re going to let our infographic tell the story.

Easy Everyday Encryption

To break terrorist encryption, pay off Apple and Google, expert urges

Other approaches might also work. By studying a suspicious person’s handset behaviors, credit card purchases and other electronic footprints -- and even voice calls -- investigators can glean a lot about a suspicious person without...

medical records healthcare medicine file document claim form doctors office hospital 000000399129

Lost devices account for bulk of healthcare security incidents

Due to reporting guidelines, lost and stolen devices account for 45 percent of all breaches in Verizon's new healthcare data breach report, accounting for 45 percent of around 2,000 incidents with total losses of more than 392 million...

00 predictions title

Security predictions that could make or break your company

Here are some best guesses about 2016 from more than a dozen vendors and analysts.

Security in 2015

By the numbers 2015: The year in security research

Security researchers were almost as busy as cybercriminals in 2015. Here are some of the noteworthy numbers of the past year.

smartphone encryption

Maximum security: Essential tools for everyday encryption

Thanks to technical advances and increased adoption, securing your data and communications is a lot easier than you might think

west east

What cyber trends to expect in 2016

2015 was another tumultuous year of more cybersecurity attacks and no different from 2014 or even 2013. Here is what to expect in 2016.

Load More