Mobile Security

Mobile Security news, information, and how-to advice

Small businesses could benefit from wireless industry 'kill switch' plans

Participants like Apple, AT&T, Google, and Verizon Wireless agree to provide "baseline anti-theft tool"

Tools

Your no-fuss, fail-safe guide to protecting Android devices

As Android's popularity continues to climb, it's increasingly joining the workplace. In its early days, Android had little in the way of security, relegating it to personal use. But over the years, Google has upped the ante in terms...


3 ways to reduce BYOD legal liability with the right conversation

As "bring your own device" (BYOD) reshapes the way organizations handle technology, how do we handle the uncertainty of legal liability and security concerns? The key to turning a potential liability into an opportunity lies in having

whatsapp ios

FTC warning unlikely to stop Facebook from changing WhatsApp privacy policies

Despite pressure from the Federal Trade Commission, Facebook is unlikely to leave WhatsApp's stricter privacy policies intact, once government regulators approve the $19 billion acquisition, privacy experts say.

CDW Integrates with Google Apps for Cloud Collaboration

Through a partnership with Google and Esna Technologies, CDW has rolled out native access to the CDW Cloud Collaboration suite within Google Apps.

The Internet of Things: An exploding security minefield

With small, underfunded developers crowding the IoT market, the need for security awareness, education and training is crucial, say Duo Security researchers

Tools

How MDM works – or doesn't work – for SMBs

Not every company is big enough to implement traditional MDM solutions, but the smaller ones are still trying to find ways to manage their corporate data

New Windows Phone security necessary, but not groundbreaking

Windows Phone 8.1 introduced today at the Build developer conference, bringing with it a slew of new security features

Google clarifies commercial spyware ban for Play store

Apps sold on Play store not allowed to track user activity in secret, according to updated developer guidelines

Why Projects Fail

CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.

Teen cyberbullying grows with 'anonymous' social chat apps

Apps like Yik Yak, Whisper and Secret offer teens online anonymity, but experts say parents need to remind kids that the promise is bogus

Rogue apps could exploit Android vulnerability to brick devices

The only way to recover from such an attack involves wiping all user data from affected devices, researchers from Trend Micro said

googleglass

Why Google Glass security remains a work in progress

University researchers develop spyware for Glass that snaps pictures and sends them to a remote server

UK mobile operators join forces to combat text spam

Mobile phone users can report spam messages by forwarding them to a central service free of charge

Why Projects Fail

CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.

5 ways to prevent data loss in mobile environments

Confidential company data can make its way onto mobile devices, where it's no longer under the protection of your toughest network defenses. Does that make your data vulnerable? To find out, review some strategies for preventing data...

Ransomware attacks to target mobile devices, warns RSA

Business users less likely to be as vulnerable as consumers

Researchers find cross-platform RAT for Windows, Android

Android APK found in WinSpy, suggesting that hackers are seeking cross-platform RATs

Who put the cockroach in my supply chain?

Businesses have always had concerns about supply chain risks but, for most businesses, those risks involve shipping delays, parts shortages and labor issues. But that’s starting to change as evidenced by CSOonline’s recent coverage on

Gartner Magic Quadrant for Client Management Tools

The client management tool market is maturing and evolving to adapt to consumerization, desktop virtualization, and an ongoing need to improve efficiency.

Without proper security measures, smart homes are just begging to be targets

As they stand now, smart devices are exceedingly vulnerable to attack, and it's up to users to keep them from becoming a front door to their entire networks

Forget the endpoints, protect the data

For years the primary focus of security has been securing the endpoints. If we can just protect the desktops and laptops and tablets and smartphones from malicious exploits and prevent them from being compromised, then all would well.

Security weakness found in iOS 7

Researcher finds flaw that would allow attackers to exploit OS kernel

Some Samsung Galaxy devices contain a file access backdoor, Replicant developers say

A software program shipped with some Samsung mobile devices allows access to the file system through the modem, the developers said

Load More