Mobile Security
Mobile Security | News, how-tos, features, reviews, and videos
ESET refreshes enterprise products, embraces XDR
Auto-update, brute-force protection, and Android web control are among new features in ESET Protect.
Malware detections surge from "COVID Bounce"
A year after pandemic peak, malicious threats to businesses and consumers rose above pre-virus levels, especially for mobile devices.
6 key points of the new CISA/NSA 5G cloud security guidance
The security guidance focuses on zero-trust concepts as the US agencies anticipate growth of 5G networks.
Stealthy Trojan that roots Android devices makes its way on app stores
The criminals behind the Trojan have placed fully functional utilities that carry malicious code on the Google Play store in a way that evades detection.
How to hack a phone: 7 common attack methods explained
Mobile security often beats PCs, but users can still be fooled and smartphones can still be hacked. Here’s what you need to watch for.
FCC asks carriers to step up to stop SIM swapping, port-out fraud
The US federal agency puts pressure on telecom carriers to put better authentication, account protection safeguards in place.
5 riskiest mobile apps
Unsanctioned applications on corporate mobile devices is a security headache. Here are the five types of apps CISOs never want to find on corporate mobile devices, with strategies for mitigating the risks they pose.
Cybersecurity in 2021: Stopping the madness
The challenges are greater than ever. But security pros have learned a lot – and with luck, the right strategic defenses can help even the highest-value targets withstand severe attacks.
Clubhouse app raises security, privacy concerns
It’s got $100 million, loads of personal data, questionable privacy practices, and no CSO: What enterprise security needs to know before employees join hot new social app Clubhouse.
8 mobile security threats you should take seriously
Mobile malware? Other mobile security threats are more pressing. Every enterprise should have its eye on these eight issues.
How attackers exploit QR codes and how to mitigate the risk
Attackers are taking advantage of the increased use of QR codes to steal sensitive information or conduct phishing campaigns. Here's what security teams and employees need to know.
Alien malware a rising threat to mobile banking users
The Alien malware has quickly become a popular choice for cybercriminals to commit bank fraud. Here's why.
Mobile security failings putting enterprises at risk
A typical mobile security breach in a large organization can cost millions of dollars. Mobile Security can be a daunting task with many potential pitfalls to protect against. Knowing the key security exposure mechanisms can help you...
Tech Primer
What it takes to become an information assurance analyst
This in-demand role calls for a rare combination of superior communication skills and security chops. Learn how one information assurance analyst landed his current job, the skills and training that helped him get there, and where his...
Tech Primer
Fraud prevention: Improving internal controls
Internal fraud controls aren't fire-and-forget. Smart collaboration and ongoing improvement will help keep fraud in check. Here are the basics.
Tech Primer
How to write an information security policy
Learn the critical first step, why consensus is key, what to cover and how make your information security policy — and program — effective.
Tech Primer
Red team versus blue team: How to run an effective simulation
Playing the role of an attacker can make your team better at defense. Learn how in our step-by-step guide to war gaming your security infrastructure — from involving the right people to weighing a hypothetical vs. live event.
Tech Primer
How to survive (and thrive) in the CISO hot seat
The CISO role is more varied and more pressure-filled than ever. CSO Online looks at how you can be successful in a post where security incidents and management feuds can cost you your job.