Mobile Security

Mobile Security news, analysis, research, how-to, opinion, and video.

fitness band app stock
samsung pay mobile wallet nfc

unveil disclosure

Defining ransomware and data breach disclosure

Does a ransomware attack cause the “acquisition, access, use or disclosure” of ePHI?” No court decision has yet to address this issue, but expert commentators have taken either side of the argument.

windows 10 phone mobile desktop

Security Sessions: Protecting data when it’s increasingly mobile

Brett Hansen from Dell Security Solutions joins CSO to discuss data protection when employees and business partners are increasingly mobile

smartphone swipe

Attackers could steal millions through online phone verification systems

A researcher finds he could earn millions of dollars by abusing the online phone verification systems used by Google, Microsoft, and Instagram.

apple watch

Wearables could compromise corporate data

Smartwatches, fitness trackers and other wearable devices that are connected to corporate Wi-Fi networks could lead to serious privacy and security issues, experts say.

pokemon go app phone

Pokémon Go’s data collection provokes privacy concerns by US Senator

U.S. Senator Al Franken, a strong privacy advocate, has raised the inevitable question about the privacy of the extensive data the game collects from its users, including children, and whether the data is used for other purposes.

Pokemon Go

Experts say Pokémon Go exposes players to security and privacy risks

Last week, Pokémon Go was officially released in the U.S. and players downloaded the application in droves. Overall, gamers are reporting a mostly positive experience, after a few server issues, but security experts warn that the app...

merge puzzle

Antivirus merger: Avast offers $1.3 billion for AVG

Antivirus vendor Avast Software has agreed to buy rival AVG Technologies for US$1.3 billion in cash.

ok google

Here's how secret voice commands could hijack your smartphone

Researchers have found something new to worry about on the internet. It turns out that a muffled voice hidden in an innocuous YouTube video could issue commands to a nearby smartphone without you even knowing it.

rio police airport

Rio Olympics pose security risks to travelers

Physical safety isn't the only thing that travelers need to worry about at the Rio Olympics -- security experts warn that travelers need to be extremely careful when they access computer networks, as well.

endpoint protection 1

10 cutting-edge tools that take endpoint security to a new level

The 10 products we tested in this review go beyond proactive monitoring and endpoint protection and look more closely at threats. They evaluate these threats in a larger ecosystem, combining the best aspects from network intrusion...

man in the middle primary

Examining man-in-the-middle attacks

David Richardson, director of product at Lookout, walks us through this all-too-common attack.  

trojan horse wooden

This mobile Trojan from China fills your phone with porn apps

Malware that secretly installs porn apps on your phone is infecting devices by the millions, becoming the world’s largest mobile Trojan.

ransomware locked computer stock image cropped

Kaspersky: Ransomware that encrypts is booming

Over the past year the number of machines hit by ransomware that encrypts all or part of the hard drive is five-and-a-half times what it was the year before, according to Kaspersky Lab.

mobile enterprise apps

Dangerous keyboard app has more than 50 million downloads

The Flash Keyboard app has been downloaded more than 50 million times -- but is capable of some extremely dangerous behaviors.

online security hacker

A pen test a day keeps hackers away

Penetration testing has evolved from a nice to have test to a mandatory test, Besides compliance a PEN test will tell you just how secure your organizations data really is. Your network is being scanned and attacked daily, don't wait...

rat

Are RATs ever a good idea?

The concerns to think about when deciding whether to use remote access tools

data protection

Data protection strategy for mobile devices

So the question remains unanswered, what sort of technology can enterprises include in their data protection strategy to prevent data loss from mobile devices and what are the solutions available today to address these challenges.

Android device updates: AT&T Galaxy Note 5, S6 Edge+ score Marshmallow, HTC 10 gets camera patch

The monthly security update is also rolling out to the AT&T Galaxy S7 and S7 Edge.

Load More