Mobile Security

Mobile Security | News, how-tos, features, reviews, and videos

tracking cctv ai facial recognition camera zoom recognizes person surveillance scanning crowd peopl
ladybugs bugs

Android Security

Android security: Which smartphones can enterprises trust?

A broad range of vendors means a broad range of security issues to understand and assess. But three Android vendors meet the highest security standards — and one should be avoided.

diversity south africa man holding smartphone mobile technology connected by peopleimages gettyimag

Espionage campaign loads VPN spyware on Android devices via social media

Attackers built a fake online community and used a malicious VPN app to steal credentials and other user data.

A frowning, anxious woman looks at her phone in shock and horror.

Cybersecurity startup launches mobile app to protect against phishing attacks

Israeli startup novoShield has released an iPhone app that protects users against malicious websites.

locked phone and virtual data [mobile security]

In-app browser security risks, and what to do about them

Data security and privacy risks surrounding in-app browsers have been making headlines. These are the threats they pose and steps needed to minimize them.

5g cellular tower

Top 5 security risks of Open RAN

Open RAN enables interoperability among hardware, software, and interfaces used in cellular networks but also changes their attack surface.

government cios without authority washington columns executives

The Secret Service’s missing text messages: Lessons for IT security

The drama in Washington shines a light on the challenges in securing mobile communications and the role that document destruction and retention policies play in organizational security.

Mobile phone data privacy.

Mobile apps are a privacy nightmare. The Roe decision put them center stage.

Concerns about app data and location tracking put digital privacy rights in the cross hairs of abortion access debate

spyware alert notification

Italian spyware firm is hacking into iOS and Android devices, Google says

RCS Lab spyware uses known exploits to install harmful payloads and steal private user data, according to a Google report.

wireless network - industrial internet of things edge [IoT] - edge computing

MITRE ATT&CK v11 adds ICS matrix, sub-techniques for mobile threats

The latest version of the MITRE ATT&CK Framework addresses two of the most pressing threat-actor targets: mobile devices and industrial control systems.

mobile security endpoint protection

ESET refreshes enterprise products, embraces XDR

Auto-update, brute-force protection, and Android web control are among new features in ESET Protect.

mobile security / threat detection / traffic analysis

Malware detections surge from "COVID Bounce"

A year after pandemic peak, malicious threats to businesses and consumers rose above pre-virus levels, especially for mobile devices.

5G light trails

6 key points of the new CISA/NSA 5G cloud security guidance

The security guidance focuses on zero-trust concepts as the US agencies anticipate growth of 5G networks.

Smishing, an SMS phishing attack / Vishing, a voice phishing attack by phone

Stealthy Trojan that roots Android devices makes its way on app stores

The criminals behind the Trojan have placed fully functional utilities that carry malicious code on the Google Play store in a way that evades detection.

mobile security / threat detection / traffic analysis

How to hack a phone: 7 common attack methods explained

Mobile security often beats PCs, but users can still be fooled and smartphones can still be hacked. Here’s what you need to watch for.

endpoint security hacker vulnerablility secure mobile security app

FCC asks carriers to step up to stop SIM swapping, port-out fraud

The US federal agency puts pressure on telecom carriers to put better authentication, account protection safeguards in place.

mobile security login password

5 riskiest mobile apps

Unsanctioned applications on corporate mobile devices is a security headache. Here are the five types of apps CISOs never want to find on corporate mobile devices, with strategies for mitigating the risks they pose.

What it takes to become an information assurance analyst

This in-demand role calls for a rare combination of superior communication skills and security chops. Learn how one information assurance analyst landed his current job, the skills and training that helped him get there, and where his...

Fraud prevention: Improving internal controls

Internal fraud controls aren't fire-and-forget. Smart collaboration and ongoing improvement will help keep fraud in check. Here are the basics.

You Might Also Like