As the ShmooBus clears Baltimore and bears down on D.C., it’s clear from talking to folks that mobile security will be a major point of interest at ShmooCon.What’s that, you say? No big revelation in that statement? Duh?True.But it does go to show how things have changed in recent years. I remember writing a lot of stories about how smartphone threats were theoretical and a couple years away. Now everybody and their grandparents own a smartphone: BlackBerry, Android and iPhone among the most popular choices.The bad guys know this, and they’re making plans. So are the good guys. At least three people on this RV are eager to learn more about mobile threats and how best to secure the devices. No, not a revelation.But as someone who owns an Android and used to own a BlackBerry, I’m glad that conference goers have this high on their list.Of course, there’s many more security topics on the agenda, and this weekend will be a good learning experience for everyone.We’re all tired but in good spirits. We’ll see you shortly, ShmooCon.–Bill Brenner Related content news Gwinnett Medical Center investigating possible data breach After being contacted by Salted Hash, Gwinnett Medical Center has confirmed they're investigating a security incident By Steve Ragan Oct 02, 2018 6 mins Regulation Data Breach Hacking news Facebook: 30 million accounts impacted by security flaw (updated) In a blog post, Facebook’s VP of product management Guy Rosen said the attackers exploited a flaw in the website's 'View As' function By Steve Ragan Sep 28, 2018 4 mins Data Breach Security news Scammers pose as CNN's Wolf Blitzer, target security professionals Did they really think this would work? By Steve Ragan Sep 04, 2018 2 mins Phishing Social Engineering Security news Congress pushes MITRE to fix CVE program, suggests regular reviews and stable funding After a year of investigation into the Common Vulnerabilities and Exposures (CVE) program, the Energy and Commerce Committee has some suggestions as to how it can be improved By Steve Ragan Aug 27, 2018 3 mins Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe