Mobile Security

Mobile Security news, analysis, research, how-to, opinion, and video.

false identity
man person clouds tablet

fbi trump iphone

A year after terrorist attacks, phone privacy laws unchanged – but watch out for Trump

Although the perpetrators of the San Bernardino mass shooting were killed in a gun battle with law enforcement within hours of the attack, the FBI’s interest in one terrorist’s iPhone precipitated a public standoff with Apple that...

growth money time plants

Security budgets continue to grow, but is it enough?

Cybersecurity is now a top concern for businesses, but the reality is that it should have been on their radar years ago. Why did businesses wait so long to invest in cybersecurity?

07 insider

Unwitting attacks from the inside

Employee involvement top causes of most expensive breaches

tel aviv city hall

Hacker shows how easy it is to take over a city’s public Wi-Fi network

An Israeli hacker found a vulnerability in routers that could have allowed him to take over the public Wi-Fi network of an entire city.

01 pragmatic

How to maintain data and document security with a mobile workforce

As security leaders, we want to allow your teams to move as fast as possible and not deploy a policy or technology because someone touts it as the best way to do something. CRM vendor Conga provides these tips for that healthy balance....

Android N statue

Android patches fix Drammer RAM attack, but not Dirty Cow exploit

Google released a new monthly batch of security patches for Android Monday, fixing a dozen critical vulnerabilities that could allow attackers to compromise devices.

20160224 stock mwc smartphone user in suit

Hackers can abuse LTE protocols to knock phones off networks

The new Diameter protocol that LTE mobile networks use to communicate with each other can still be abused to launch attacks against users if operators don't take additional security measures, researchers showed.

andrew zuis note7

What about the personal data on those millions of recalled Note7s?

The users of millions of faulty Samsung Galaxy Note7s face a another potential dilemma: The fate of their personal data on the devices.

smartphone digital

Black Hat Europe: IoT devices can hack phones

The Internet of things (IoT) has already been used to launch the biggest DDoS attacks ever, but now it represents a potential path for attackers to compromise cell phones.

google pixel phone

“OK Google” – Two words to describe the security trade-off on Google’s Pixel

Using your voice to unlock a phone sounds cool, but for some security professionals that’s a security trade-off they’re unwilling to make. On Tuesday, one researcher discovered the downside of the Trusted Voice feature on Google’s...

bullseye hospital healhcare

Unencrypted pagers a security risk for hospitals, power plants

For most of us, pagers went out when cell phones came in, but some companies are still using them and when the messages sent without encryption, attackers can listen in and even interfere with the communications

00 intro safeguards

10 ways to make sure your remote workers are being safe

Wombat Security Technologies recommends remote employees follow these 10 best practices to shore up security for their organizations — and themselves.

electrical grid powerline

Defending the grid

The vulnerabilities that allow hackers to infiltrate protocol and DDoS attack

0 pixel phones

Security apps you need on your new Pixel

Privacy and security apps that should be the first apps on Google's new phone to help avoid growing mobile security threats, including identity theft, hacks and breaches.

russian flag concept

Russian criminals' bank attacks go global

Russian cybercriminals have field tested their attack techniques on local banks, and have now begun taking them global, according to a new report -- and a new breed of mobile attack apps is coming up next.

samsung pay mobile wallet nfc

Researcher unveils second Samsung Pay vulnerability

A security researcher has found a second vulnerability in Samsung Pay and plans to demonstrate it at a security conference next week in Argentina

iphone fingerprint 5s

To unlock phones, feds demand all occupants surrender fingerprints

U.S. investigators are exercising a broad legal authority to force suspects to unlock their smartphones. In a recent case, they demanded that anyone found inside a California residence give up their fingerprints.

Backdoor

The FBI demands a key to your backdoor

The FBI has demanded that all new homes built starting this year have a rear entrance with a special lock. Wait - what? Relax - they didn't really ask and this isn't happening. It almost did, though, but the key wasn't to your home,...

Load More