Mobile Security

Mobile Security news, analysis, research, how-to, opinion, and video.

symantec banner
android anti virus security

Will LaSala

Salted Hash Ep 24: Defending against mobile threats

Welcome back! After shooting several episodes during the RSA Conference in San Francisco, this week Salted Hash talks mobile threats with VASCO's Will LaSala. In addition to this week's episode, we've also got some additional footage...

Will LaSala
video

Defending against mobile technology threats | Salted Hash Ep 24

What are the current dangers in mobile technology and what are the strategies to keep yourself protected? Join host Steve Ragan from the show floor at RSA 2018, where he talks with Will LaSala, director of Security Solutions and...

security

Left-shifting enterprise appsec: what we can learn from mobile app developers

Multiple, concurrent innovations in enterprise application development present the opportunity to improve application security by “left-shifting” it to the beginning (and throughout) the dev cycle. Mobile app developers have to a...

avast security pro for mac icon

Law enforcement uses anti-virus software to recover suspect's web history

Let’s mainstream the idea that privacy is almost impossible in the face of digital forensics. Avast AV leaving behind a private browsing database, is a shocking illustration of this.

mobile security threat detection

Keep your mobile workforce safe: understand the threats

As you review your mobile security strategy, make sure the solutions you choose shield devices from infected apps, man-in-the-middle attacks, OS exploits, malicious links in SMS messages and other exploits.

moviepass app

Thanks to MoviePass app tracking, CEO claims, 'We know all about you'

MoviePass CEO Mitch Lowe revealed the app tracks users before and after going to the movies.

facial recognition - biometric security identification - binary face

Thinking about identity management for the RSA Security Conference

Password elimination, software-defined perimeter, and the need for security to “own” identity should be highlighted at the RSA Conference.

Dislike! Social media addiction

Facebook's free VPN acts like spyware to iOS users in the U.S.

Facebook's new VPN service for iOS users in the U.S. claims to provide security protections, but it also tracks users -- collecting mobile data traffic.

salted hash thumbnail final
video

Managing open-source mobile security and privacy for activists worldwide | Salted Hash Ep 18

Nathan Freitas, who heads The Guardian Project, talks with host Steve Ragan and senior writer J.M. Porup about the group's easy-to-use secure apps, open-source software libraries, and customized mobile devices being used around the...

endpoint security hacker vulnerablility secure mobile security app

4 must-know facts about secure mobile printing

Mobile printing is making major strides right now. Is your company's mobile print security up to speed?

financial tech

List of 200 cybersecurity startups that received venture capital in 2017

VC firms and corporate investors are fueling a trillion-dollar cybersecurity market.

meltdown spectre

Meltdown and Spectre affect the smartphone in your pocket. Should you be worried?

Android and iOS devices are vulnerable to the latest hardware security flaw, and not all are easily patched. The good news: Exploits are hard (maybe) and so far none are known.

01 holiday phishing

The gift of digital safety

In a world that appears to be in a digital frenzy, let’s help each other be more aware of our digital surroundings so that we can continue to experience all of the joy that technology and the tides of this season bring.

6 password

Unraveling the truth about the NIST's new password guidelines

tl;dr: if you’re using a password manager, you should be in really good shape.

malware cybersecurity skull crossbone

Loapi malware capable of destroying Android phones

Kaspersky researchers discovered malware capable of cryptocurrency mining, launching DDoS attacks and so much more that it destroyed an Android phone after two days.

Future Wi-Fi

Time to close the gate on open wireless networks

Trusted networks are not always what they seem. Ask a hacker. They love your employees’ casual use of open wireless networks.

Mobile security

5 mobile security threats you should take seriously in 2018

Mobile malware? Some mobile security threats are more pressing. Every enterprise should have its eye on these issues in the coming year.

businesswoman mobile apps

Mobile app trackers can lead to significant data loss

More likely than not, your apps are tracking you. But where is your data going?

Load More