Mobile Security

Mobile Security news, analysis, research, how-to, opinion, and video.

0 pixel phones
russian flag concept

samsung pay mobile wallet nfc

Researcher unveils second Samsung Pay vulnerability

A security researcher has found a second vulnerability in Samsung Pay and plans to demonstrate it at a security conference next week in Argentina

iphone fingerprint 5s

To unlock phones, feds demand all occupants surrender fingerprints

U.S. investigators are exercising a broad legal authority to force suspects to unlock their smartphones. In a recent case, they demanded that anyone found inside a California residence give up their fingerprints.


The FBI demands a key to your backdoor

The FBI has demanded that all new homes built starting this year have a rear entrance with a special lock. Wait - what? Relax - they didn't really ask and this isn't happening. It almost did, though, but the key wasn't to your home,...

google pixel xl

Verizon Pixel phones will get Android updates at the same time as those sold by Google

Big Red also reaffirmed you'll be able to uninstall the three Verizon apps that will come preloaded on the Pixel sold in the company's stores.

mean angry pig

Backdoor dubbed Pork Explosion lets attackers go hog wild on Android phones

A backdoor in Android firmware provided by manufacturer Foxconn allows attackers to root devices to which they have physical access, according to a security researcher and BBQ enthusiast who dubbed the vulnerability Pork Explosion.

glass office cloud

Business transformation proves to be a catalyst for cybersecurity spending

Evolving risks and business technologies shift focus in security budgets

stocks rising

Cybersecurity companies’ stock rise in face of post-Yahoo hack

Major hacks and ransomware targeting the healthcare sector appear to be stimulating investor appetite for cybersecurity stocks.

man in the middle primary

Man in the middle attacks on mobile apps

Man in the middle attacks (MiTM) are a popular method for hackers to get between a sender and a receiver. MiTM attacks, which are a form of session hijacking are not new. However, what might not be known is that mobile devices are...


Bounty for iOS jailbreak exploit jumps to $1.5 million

The value for zero-day exploits targeting Apple's iOS software is jumping. On Thursday, a company called Zerodium began offering as much as $1.5 million for them.

00 intro

10 ways to secure a mobile workforce

As much as you might want to implement all the latest best practices and lock down your company like Fort Knox, you need to align your policies to your company culture.

rocking chair farmer

CISOs shouldn't wait until retirement for social security

A security industry expert says CISOs should be responsible for cyber defending the social media accounts belonging to employees at their organizations... and they should be doing it now.

Tesla Model S

Researchers demonstrate remote attack against Tesla Model S

Researchers from Chinese technology company Tencent found a series of vulnerabilities that, when combined, allowed them to remotely take over a Tesla Model S car.

20160224 stock mwc massive iot sign

Industrial IoT is inching toward a consensus on security

The Industrial Internet Consortium, a group that includes some of the biggest players in the internet of things, took action on Monday to clear the air around industrial IoT security. It rolled out the Industrial Internet Security...

CSO password management survival guide

The CSO password management survival guide

It's time to take the password problem in hand. This free guide from the editors of CSO will help you communicate the challenges and what is at stake and evaluate and choose the right enterprise password management solution for your...


Chrome OS gets cryptographically verified enterprise device management

Companies will now be able to cryptographically validate the identity of Chrome OS devices connecting to their networks and verify that those devices conform to their security policies.

texting woman iphone macbook

The best messaging apps with end-to-end encryption

If you want to keep prying eyes away from your conversations, then these are the apps that you need to get.

stop sign bullet holes

Emerging technologies are poking holes in security

Accelerated change challenges change management, security DevOps and emerging technologies that enable business innovation and opportunities demand fast, frequent change from the enterprise. The speed and regularity as well as the...

security light

20% off Kuna Smart Home Security Outdoor Light & Camera - Deal Alert

Night or day, Kuna’s smart outdoor security camera system detects movement at your door and sends actionable alerts to your mobile device, allowing you to safely take action using Kuna’s lights, HD live video feed, two-way intercom,...

Load More