Mobile Security

Mobile Security news, analysis, research, how-to, opinion, and video.

coolpad
smartphone encryption

business traveler airport

How to prevent theft, loss and snooping on the road

All your pricey electronics are juicy targets for hackers and sticky-fingered thieves. Here's how to reduce your risks while traveling.

android apple lock

How to secure Apple and Android mobile devices using 802.1X

Understanding all the 802.1X client settings can certainly help during deployment and support of an enterprise network.

gift combo lock

8 Christmas gifts that will need to be secured

After employees unwrap their holiday gifts, many will want to bring them in to use for work. Remote employees may use personal devices at home to access corporate data. Here are eight popular products found under the tree, and advice...

spying

NSA spy program targets mobile networks worldwide

The NSA has conducted a covert campaign to intercept internal communications of operators and trade groups in order to infiltrate mobile networks worldwide, according to the latest revelations from documents supplied by Edward Snowden....

1280px a google glass wearer

Data from wearable devices could soon land you in jail

Data from a Fitbit wristband is being used in an insurance civil litigation case, but the ramifications of the legal fight are clear: A judge can subpoena data from a wearable device.

android death ring

Android 'DeathRing' malware being pre-loaded on cheap smartphones

Chinese supply chain under suspicion yet again

satellite dish red cellular

No ordinary mobile attack: The Regin menace

Regin is the story of a global cyberattack mechanism on a massive scale. Hold on to your seats, because I'm going to take you on a bumpy ride.

Cheapest tablets pose biggest security risks

The super-cheap Android tablets everyone bought on Black Friday and Cyber Monday could pose problems for enterprises when they arrive at the workplace after the holidays.

00 title

8 holiday scams and mistakes to avoid

You're not the only one feeling merry and bright this holiday season - so are the criminals! This time of year provides them with plenty of opportunities for Scrooge-worthy scams. Here's how to ensure all they'll get is coal in their...

seamless security

How to create seamless mobile security for employees

If your organization’s security procedures are disruptive and clunky, frustrated employees will figure out how to get around them. Here’s how three companies created a secure and seamless experience for end users.

NotCompable sets new standards for mobile botnet sophistication

The NotCompatible mobile malware has reached a new level of sophistication. The malware was first detected in 2012, but the newly discovered variant, NotCompatible.C, is the most complex mobile malware ever seen.

smartphone encryption

Smartphone encryption – What does it mean to you?

Why are legislators considering going to Congress for access to our cell phones?

mobile security

5 steps to more mobile-security-savvy employees

It takes more than policies and penalties to make your workers smart about mobile security. Here’s how to identify and correct problem behaviors in your organization that can leave your corporate data vulnerable.

Launching app

Vulnerability leaves iPhones open to fake app attack

Attackers can replace legitimate apps with fake ones that access and steal personal information

computer network with globe 000007092929

Employee-owned PCs are scaring enterprise IT

IT departments are worried about security risks when employees use their PCs for work purposes, but employees aren’t going to stop anytime soon.

apple ipay

Experts: Don’t use Apple Pay, CurrentC until crooks get a shot at them

While major retailers hem and haw about whether to use Apple Pay vs CurrentC, security experts say those concerned about their safeguarding their credit data might be wise to hold off using either of the payment systems until they’ve...

whisper

Whisper executive says tracking happens, but the data isn't exact

On Thursday, the Guardian published a story on how the anonymous secret sharing application, Whisper, was actually tracking users despite claims to the contrary.

ios threats

Top 6 threats to iOS devices

Given the recent iOS update and iPhone announcement, a security group provides tips to fend off threats to your device.

Load More