Mobile Security

Mobile Security news, analysis, research, how-to, opinion, and video.

2015 jeep cherokee
5 childrens gadget

hacking connected car

4 simple ways to secure your Internet-connected car

Cars with systems that connect to the Internet are potentially vulnerable to intrusions by hackers. Here are four steps to help protect your automobile without spending a dime.

iphone htc

Tech trade group objects to weakening smartphone encryption

The Information Technology Industry Council on Thursday decried efforts to weaken encryption on smartphones, even though some officials in Washington favor doing so.

20151109 dojo device

Home IoT security could come from a glowing rock next year

Home IoT security startup Dojo-Labs thinks it can reduce the complexity of a home full of connected devices to three colors: red, orange, and green.

isis flag graphic

Message service blocks 78 ISIS-related encrypted channels

Telegram reacts to abuse reports sent in by its customers.

linux encryption

U.S. may be financing encryption apps to stay ahead of terrorists

The U.S. government's financial support for the development of smartphone encryption apps doesn't surprise security experts.

150902 encrypt android

Feds fund encryption apps that could cloak terrorists

U.S. government funds have recently been used to support the creation and maintenance of commercially available smartphone encryption apps -- the same kinds of apps thought to be used by terrorists.

smartphone encryption

Paris attacks demand 'wake-up call' on smartphone encryption

Deadly terrorist attacks on Friday in Paris, apparently planned by ISIS, have ignited a new round of concerns over smartphone encryption.

shutterstock 335609987

FTC ruling suggests upcoming changes for data compliance regulation

Recent data breaches tell us what private and public sector victims are dealing with: disruption, reputational damage, and significant financial repercussions. They can also find themselves attracting the undesirable attention of...

nyc power plant

Are vendors on the wrong path where smart plant security is concerned?

Cyber criminals can’t wait for enterprises to mainly apply access controls and encryption as their toughest solution for securing smart plants.


iOS apps more vulnerable than Android

Applications written for iOS devices have more vulnerabilities than those written for Androids, and this has the potential for security problems in the future as attackers move to application-based threat vectors.

intro title

7 ways hackers can use Wi-Fi against you

Wi-Fi — oh so convenient, yet oh so dangerous. Here are seven ways you could be giving away your identity through a Wi-Fi connection and what to do instead.

byod laptop mobile

Is It time to re-evaluate your BYOD policy?

How can you tell if your employees have gone rogue with their personally owned devices and put corporate data at risk?

android security danger

Android security update focuses on media files

Do you like audio and video on your Android device? They lie at the heart of recent vulnerabilities in Google's latest security update


How a mobile app company found the XcodeGhost in the machine

A mobile app developer had a tough time figuring out why Apple was rejecting its app until it found the XcodeGhost malware hidden in an unlikely place.

Apple China iPhone

Apple wages battle to keep App Store malware-free

Apple is facing growing challenges keeping suspicious mobile applications out of its App Store marketplace.


Sprint faces backlash for adding MDM to devices without permission

Mobile Device Management (MDM) functionality is essential for business, but if left unchecked on consumer devices it can pose a risk. On Wednesday, a Sprint customer discovered an in-store technician adding MDM software to their...

150817 google marshmallow 06

Trojanized Android apps flood third-party stores, compromise phones

Researchers from mobile security firm Lookout have found over 20,000 samples of trojanized apps that root devices.


Google researchers poke holes in Galaxy S6 Edge, show OEMs add risky code

Google's security researchers found 11 serious vulnerabilities in Samsung's Galaxy S6 Edge phone in code that was added by the manufacturer.

Load More