Mobile Security

Mobile Security news, analysis, research, how-to, opinion, and video.

00 intro
rocking chair farmer

Tesla Model S

Researchers demonstrate remote attack against Tesla Model S

Researchers from Chinese technology company Tencent found a series of vulnerabilities that, when combined, allowed them to remotely take over a Tesla Model S car.

20160224 stock mwc massive iot sign

Industrial IoT is inching toward a consensus on security

The Industrial Internet Consortium, a group that includes some of the biggest players in the internet of things, took action on Monday to clear the air around industrial IoT security. It rolled out the Industrial Internet Security...

CSO password management survival guide

The CSO password management survival guide

It's time to take the password problem in hand. This free guide from the editors of CSO will help you communicate the challenges and what is at stake and evaluate and choose the right enterprise password management solution for your...

Chrome

Chrome OS gets cryptographically verified enterprise device management

Companies will now be able to cryptographically validate the identity of Chrome OS devices connecting to their networks and verify that those devices conform to their security policies.

texting woman iphone macbook

The best messaging apps with end-to-end encryption

If you want to keep prying eyes away from your conversations, then these are the apps that you need to get.

stop sign bullet holes

Emerging technologies are poking holes in security

Accelerated change challenges change management, security DevOps and emerging technologies that enable business innovation and opportunities demand fast, frequent change from the enterprise. The speed and regularity as well as the...

security light

20% off Kuna Smart Home Security Outdoor Light & Camera - Deal Alert

Night or day, Kuna’s smart outdoor security camera system detects movement at your door and sends actionable alerts to your mobile device, allowing you to safely take action using Kuna’s lights, HD live video feed, two-way intercom,...

samsung note7 iris setup

How it works: Iris scanning improves smartphone security

Samsung and other vendors are beginning to incorporate iris scanning into their mobile devices. We examine how this security technology works, its advantages and its drawbacks.

mark cuban

Mark Cuban's new app leaves messages in the dust, not the cloud

'Dust' enables people to send private, encrypted, self-destructing text messages.

solarin

What this expensive ‘secure’ phone tells us about mobile hacking

Mobile security is a bit of a misnomer. Few of us can say we’ve been attacked by a piece of malware or have quarantined an actual virus. Yet, there’s a sneaking suspicion that mobile security is a bigger concern.

IBM logo

Malware author tries hand at PR, contacts IBM to correct blog post

An author on the IBM security blog recently got an interesting request. The developer of a mobile malware kit wasn't pleased with their reporting, so they reached out to correct the record. IBM's coverage wasn't helping the criminal's...

colorful apps

Mobile app reversing and tampering

Mobile applications are, well, applications. And like any application they need to be protected. I’ve been blogging about attacks on mobile like mobile malware, mobile pharming and mobile phishing and I even wrote a blog on data...

iris scan security 138208300

Iris scans as ID grow in use

Iris scanner technology is emerging in smartphones, including the new Samsung Note 7, but is expected to come soon to cars and ATM machines to verify a user’s identity.

smartphoneusing

Report: Smartphone infection rate doubled in first half of 2016

Smartphone infection rates nearly doubled during the first half of this year, from 0.25 percent to 0.49 percent compared to the second half of 2015, according to a report released today by Nokia.

rubiks cube

Data at rest encryption for mobile devices

Data at rest encryption is about as far from a cutting-edge topic as one can get. But while encrypting inactive data that is stored digitally is regarded by most security professionals as a must have, as well as data in use and...

twitter broken

This Android botnet relies on Twitter for its commands

Twitter users aren’t the only ones checking the microblogging service for important updates. Android malware is starting to do so, too.

pixelated clouds reflecting on building windows

Experts challenge Skyhigh's patent for cloud-based encryption gateway

Skyhigh Networks, Inc., announced today that it has received a patent for using a hosted gateway to encrypt and decrypt data moving between users and cloud services such as Office 365, but some experts say that the technology is...

snow globe security

Despite billions spent on cybersecurity, companies aren’t truly safe from hacks

Last year, private-sector companies globally spent more than $75 billion on security software to safeguard their systems and data. Has all that spending made private sector data and systems any safer?

Load More