Mobile Security

Mobile Security news, analysis, research, how-to, opinion, and video.

information security threat primary4
smartphones 2013

nordvpn

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

NordVPN has discounted their popular VPN software 72%. Use our link and see the discount applied when you click "buy now".

android security

Most Android devices lack latest security patches

Nearly three-quarters of Android devices on the five biggest U.S. carriers are running on security patches that are at least two months old, putting them at greater risk of being hacked.

thunderbolt ethernet adapter

Newly leaked documents show low-level CIA Mac and iPhone hacks

The U.S. CIA has had tools to infect Apple Mac computers by connecting malicious Thunderbolt Ethernet adapters to them since 2012, according to new documents purported to be from the agency and published by WikiLeaks.

burlap money bag

Enterprises misaligning security budget, priorities

Those on staff who are doing the budgeting might blindly write the same amount into the security line every year. Or the C-suite might handcuff the security personnel with a tight budget that doesn’t allow for expansion into new...

p1200736

Google cites progress in Android security, but patching issues linger

The chances of you installing malware on your Android phone is incredibly small, according to Google.

01 intro byod

What to consider in developing BYOD policy

In today’s work environment, employees are increasingly expected to be constantly available and communicating. Regardless of whether the company permits it, employees will use their personal devices for work. Instead of ignoring the...

samsung galaxy s7

BlackBerry readies a more secure version of the Samsung Galaxy S7

Secusmart, the BlackBerry subsidiary that secures the German Chancellor Angela Merkel's smartphone, will roll out a version of its SecuSuite security software compatible with Samsung Electronics' Knox platform later this year.

confusion decisions future misleading direction arrows

How to cope when mobile app development goes rogue

Business units often develop mobile apps on their own, turning to IT only when things go wrong. Better governance around business units and their mobile app demands can help alleviate the worst pain points.

05 public wifi

Is your family's cybersecurity worth $20 a month?

If you're anything like me you're probably constantly on the prowl for WiFi networks to log into so that you can work, listen to music, browse, shop or read. Without being connected to the cloud via the internet your laptop or iPad...

20160225 stock mwc ericsson booth security locks

How much are vendor security assurances worth after the CIA leaks?

Google, Apple, Microsoft and other software vendors are working to identify and patch the vulnerabilities described in the CIA leak, but ultimately this doesn't change the status quo of software security.

International Paper Company

Online cybersecurity course targets business professionals

As tech folks adapt to the language of business risk, business professionals learn the language of cyber

phone picture conference

Protecting the enterprise against mobile threats

Mobile devices have transformed the digital enterprise allowing employees to access the information they need to be most productive from virtually anywhere. Has that convenience come at a cost to enterprise security, though?

dsc06014

Security holes in Confide messaging app exposed user details

Confide, a messaging app reportedly used by White House staff, apparently had several security holes that made it easier to hack.

first google

Old Windows malware may have tampered with 132 Android apps

More than 130 Android apps containing some malicious coding managed to infiltrate the Google Play store, possibly because the developers’ tools that built them were tainted, according to security researchers.

mvisa MWC 2017 announcement

Visa, Mastercard beef up mobile payment tech at Mobile World Congress

Visa on Monday announced one of the most unusual approaches, one that relies primarily on older QR code technology through its mVisa payment service.

verizon sign

Verizon's risky business: Acquiring the world's biggest hack

Verizon's biggest risk is acquiring Yahoo, victim of the biggest hack ever.

fingerprint iphone biometrics access

The future of biometrics and IoT

Many people are familiar with biometrics as a security measure at airports or police stations, where they often use a fingerprint as a form of identification, but there are many other uses outside of law enforcement.

connected cars 10

Are you afraid your car will be taken over?

A consortium was recently created to make sure that your car stays on the road and in your control.

Load More