Mobile Security

Mobile Security news, information, and how-to advice

Small businesses could benefit from wireless industry 'kill switch' plans

Participants like Apple, AT&T, Google, and Verizon Wireless agree to provide "baseline anti-theft tool"


Your no-fuss, fail-safe guide to protecting Android devices

As Android's popularity continues to climb, it's increasingly joining the workplace. In its early days, Android had little in the way of security, relegating it to personal use. But over the years, Google has upped the ante in terms...

3 ways to reduce BYOD legal liability with the right conversation

As "bring your own device" (BYOD) reshapes the way organizations handle technology, how do we handle the uncertainty of legal liability and security concerns? The key to turning a potential liability into an opportunity lies in having

whatsapp ios

FTC warning unlikely to stop Facebook from changing WhatsApp privacy policies

Despite pressure from the Federal Trade Commission, Facebook is unlikely to leave WhatsApp's stricter privacy policies intact, once government regulators approve the $19 billion acquisition, privacy experts say.

CDW Integrates with Google Apps for Cloud Collaboration

Through a partnership with Google and Esna Technologies, CDW has rolled out native access to the CDW Cloud Collaboration suite within Google Apps.

The Internet of Things: An exploding security minefield

With small, underfunded developers crowding the IoT market, the need for security awareness, education and training is crucial, say Duo Security researchers


How MDM works – or doesn't work – for SMBs

Not every company is big enough to implement traditional MDM solutions, but the smaller ones are still trying to find ways to manage their corporate data

New Windows Phone security necessary, but not groundbreaking

Windows Phone 8.1 introduced today at the Build developer conference, bringing with it a slew of new security features

Google clarifies commercial spyware ban for Play store

Apps sold on Play store not allowed to track user activity in secret, according to updated developer guidelines

Predictive Defense and Real-Time Insight: The Next Step in Advanced Threat Protection

Download this complimentary report, featuring the Gartner Research "Designing an Adaptive Security Architecture for Protection From Advanced Attacks", and learn why organizations can't rely solely on traditional blocking

Rogue apps could exploit Android vulnerability to brick devices

The only way to recover from such an attack involves wiping all user data from affected devices, researchers from Trend Micro said

Teen cyberbullying grows with 'anonymous' social chat apps

Apps like Yik Yak, Whisper and Secret offer teens online anonymity, but experts say parents need to remind kids that the promise is bogus


Why Google Glass security remains a work in progress

University researchers develop spyware for Glass that snaps pictures and sends them to a remote server

5 ways to prevent data loss in mobile environments

Confidential company data can make its way onto mobile devices, where it's no longer under the protection of your toughest network defenses. Does that make your data vulnerable? To find out, review some strategies for preventing data...

Healthcare Information Management: A New Urgency

With the challenges of an evolving regulatory environment and the information overload problem with management practices, many organizations have now reached an inflection point.

Ransomware attacks to target mobile devices, warns RSA

Business users less likely to be as vulnerable as consumers

UK mobile operators join forces to combat text spam

Mobile phone users can report spam messages by forwarding them to a central service free of charge

Researchers find cross-platform RAT for Windows, Android

Android APK found in WinSpy, suggesting that hackers are seeking cross-platform RATs

Who put the cockroach in my supply chain?

Businesses have always had concerns about supply chain risks but, for most businesses, those risks involve shipping delays, parts shortages and labor issues. But that’s starting to change as evidenced by CSOonline’s recent coverage on

Social Media and Compliance: Overview for Regulated Organizations

The growing use of social media in business today is undeniable. Social media is fast, ubiquitous, and in many cases produces measurable ROI to a business; however, it also poses significant risks that can become public and

Without proper security measures, smart homes are just begging to be targets

As they stand now, smart devices are exceedingly vulnerable to attack, and it's up to users to keep them from becoming a front door to their entire networks

Forget the endpoints, protect the data

For years the primary focus of security has been securing the endpoints. If we can just protect the desktops and laptops and tablets and smartphones from malicious exploits and prevent them from being compromised, then all would well.

Some Samsung Galaxy devices contain a file access backdoor, Replicant developers say

A software program shipped with some Samsung mobile devices allows access to the file system through the modem, the developers said

Security weakness found in iOS 7

Researcher finds flaw that would allow attackers to exploit OS kernel

Load More