Mobile Security

Mobile Security news, analysis, research, how-to, opinion, and video.

dsc05255
pixelated clouds reflecting on building windows

snow globe security

Despite billions spent on cybersecurity, companies aren’t truly safe from hacks

Last year, private-sector companies globally spent more than $75 billion on security software to safeguard their systems and data. Has all that spending made private sector data and systems any safer?

messaging apps threats security privacy thought bubbles

How IT can limit the risk of popular messaging apps

CIOs have battled shadow IT for years, long before the advent of messaging apps such as WhatsApp and Facebook Messenger. Here's how a set of IT pros makes the most of the latest challenge.

video

Samsung Galaxy Note7 iris scanner review

CIO.com's Al Sacco goes hands on with the Samsung Galaxy Note7 smartphone and its new biometric iris scanner.

free wifi

10 year-old teaches hackers a valuable lesson in privacy

Evan Robertson, age 10, took a science fair project and turned it into a valuable lesson in privacy earlier this month at rootz Asylum, a kids-only gathering at DEF CON where children can learn about security in a safe, encouraging...

android logo robot nougat

Google details security features in Android 7.0 'Nougat'

Google shared information on the best new security features in its next major mobile OS update, Android 7.0 'Nougat,' including a faster direct boot, streamlined software updates and enhanced integration with corporate directories.

baltimore police

FCC urged to crack down on Baltimore police for using phone trackers

Three civil rights groups have filed a complaint against Baltimore City police for using cell site simulator technology to investigate potential crimes.

texting dark

Snowden and Huang hope to help smartphones go dark

NSA whistleblower Edward Snowden and superstar hacker Andrew “bunnie” Huang are working on a device that will let journalists know if their phones are betraying them.

blackhat 2015 jeep hack

Presentations show the auto industry needs to shore up cars' security

A look at security tools that help auto manufacturers build safer connected cars

samsung pay mobile wallet nfc

Samsung both denies and admits mobile payment vulnerability

Samsung said that reports of a vulnerability in Samsung Pay mobile payments were "simply not true" -- but also admitted that token skimming was, in fact, possible but difficult enough that the potential risk was acceptable

mobile malware

Mobile malware – same attacks – different pathogens

I’ve been blogging about mobile attacks and how they can be different than attacks on more traditional platforms. For example, I wrote about: Mobile phishing – same attacks – different hooks Mobile pharming – same attacks –...

Danalock

Many bluetooth smart locks open easily for attackers

Plain text passwords, bad encryption, and susceptibility to man-in-the-middle attacks are just some of the problems plaguing Bluetooth locks.

old combine farming great depression dust bowl combine harvestor antique 000003220203

Mobile pharming – same attacks – different seeds

I recently wrote a blog on mobile phishing titled: Mobile phishing – same attacks – different hooks. There was so much feedback that I’ve decided to a write a few more posts around mobile security differences. Since I’ve already...

original sale 4102 image

90% off Become an Ethical Hacker With This Complete eLearning Bundle - Deal Alert

With cyberattacks putting everyone on edge, companies are looking for ethical hackers--IT pros paid handsomely to hack their network, expose security flaws, and fix them before someone else breaks in. Learn the tools of the ethical...

pokemon go pikachu

What awareness gamification programs can learn from Pokemon Go

At the moment, the only intended gamification of Pokemon Go is to encourage people to spend money within the game. There are potentially future uses of the game, such as to get people to spend money at partner vendors. For now...

150817 google marshmallow 06

Qualcomm-powered Android devices plagued by four rooting flaws

Hundreds of millions of Android devices based on Qualcomm chipsets are likely exposed to at least one of four critical vulnerabilities that allow non-privileged apps to take them over.

mans hand with key card to hotel room door

How to protect yourself from common hotel security threats

Frequently travelers who aren't prepared for the security risks associated with staying in hotels put potentially sensitive information and their own personal safety at risk. Here's how to spot common threats, and protect your data...

iranian tehran election

15 million Iranian users hacked

Hackers obtained the mobile phone numbers of 15 million Iranian users of the Telegram encrypted messaging app, and hacked the accounts of more than a dozen of them, security researchers say.

mobile phishing

Mobile phishing – same attacks – different hooks

I spent the last two weeks talking with CISOs, application developers, mobility experts and IoT thought leaders like SRI’s Dr. Ulf Lindqvist. One thing was for certain – mobile is receiving a lot of attention from the...

Load More