Mobile Security

Mobile Security news, analysis, research, how-to, opinion, and video.

4120913056 d1931898b4 o
internet of things graphic

spoofing 1

5 active mobile threats spoofing enterprise apps

Enterprise employees use mobile apps every day to get their jobs done, but when malicious actors start impersonating those apps, it spells trouble for IT departments everywhere. Here are 5 apps that masquerade as real apps.

apple campus headquarters stock

Apple hires mobile encryption pioneer amid encryption debate

Apple revealed Tuesday that it rehired a security expert who has a background as a mobile encryption pioneer, as the company continues to face scrutiny from governments wanting more access to its products.

managed security service providers

Security training programs don't do enough to mitigate insider risk

The threats posed by negligent insiders top many security professionals' lists of security concerns, but even organizations that have data protection and privacy training programs aren't getting through to their employees.

ubiquiti airrouter 01

Worm infects unpatched Ubiquiti wireless devices

Routers and other wireless devices made by Ubiquiti Networks have been infected by a worm that exploits a one-year-old remote unauthorized access vulnerability.

fbi seal headquarters

Criminal defendants demand to see FBI's secret hacking tool

A secret FBI hacking tool, used to compromise the Tor anonymous browser in one investigation, is facing challenges from criminal defendants, perhaps putting its future in doubt.

pacemaker xray

SOURCE Boston: Medical devices still vulnerable, but things may be changing

Connected medical devices bring life-sustaining therapy and convenience to millions of people. But they remain vulnerable to online attackers. The goal of some security companies is to change that.

samsung google play

60% of enterprise phones still vulnerable to QSEE exploit

Most enterprise users with Android phones are still vulnerable to an exploit that allows attackers to get into their phone's Qualcomm Secure Executive Environment and completely take over the phone, up to and including modifying the...

overloaded

How employees can share the IT security load

Security threats weigh heavily on IT and security professionals, and it is a responsibility that they should not bear alone. We all need to do our part to uphold the safeguarding of sensitive data.

twittrer phone

Got privacy? If you use Twitter or a smartphone, maybe not so much

The notion of online privacy has been greatly diminished in recent years, and just this week two new studies confirm what to many minds is already a dismal picture.

messaging apps threats security privacy thought bubbles

Popular messaging apps present real enterprise threat

CIOs and other IT professionals need to strategically manage the use of today's popular consumer messaging apps in the enterprise. While that process can be a challenge, it's possible to protect your business without blocking all...

privacy door

FBI/Apple privacy fight left out a major player: the data carriers

The debate over privacy does not begin and end with the recent battle between the FBI and Apple over unlocking an iPhone. The major carriers of the data in smartphones and other devices are also very involved in government access to...

managed security service providers

5 security experts share their best tips for ‘fringe’ devices

Some of the most hackable devices in your network are also probably the most-overlooked.

aruba networks

Aruba fixes networking device flaws that could open doors for hackers

Wireless networking device manufacturer Aruba Networks has fixed multiple vulnerabilities in its software that could, under certain circumstances, allow attackers to compromise devices.

01 intro

7 ways to prevent mobile break-in

As mobile devices continue to penetrate our society, mobile security is becoming increasingly difficult to manage. Every mobile device we own, whether it’s a phone or a tablet, provides hackers with a new avenue to seize private...

20160224 stock mwc qualcomm booth sign

Qualcomm flaw puts millions of Android devices at risk

A vulnerability in an Android component shipped with phones that use Qualcomm chips puts users' text messages and call history at risk of theft.

CSO password management survival guide

The CSO password management survival guide

It's time to take the password problem in hand. This free guide from the editors of CSO will help you communicate the challenges and what is at stake and evaluate and choose the right enterprise password management solution for your...

20160224 stock mwc qualcomm booth sign

Qualcomm patches widespread vulnerability, but most phones will remain at risk

Qualcomm has patched a vulnerability in netd (network_manager), which for the last five years has left devices vulnerable to having their text message and contact databases compromised. Qualcomm sent OEMs a fix for this problem back...

video

Why passwords fail end users

At the 2016 Interop show, Network World got a quick demo of Keeper Security's password management and vault app. The company's CEO, Darren Guccione, also explained why most password methods fail end users, and whether biometrics...

Load More