Mobile Security
Mobile Security | News, how-tos, features, reviews, and videos
Android security: Which smartphones can enterprises trust?
A broad range of vendors means a broad range of security issues to understand and assess. But three Android vendors meet the highest security standards — and one should be avoided.
Espionage campaign loads VPN spyware on Android devices via social media
Attackers built a fake online community and used a malicious VPN app to steal credentials and other user data.
Cybersecurity startup launches mobile app to protect against phishing attacks
Israeli startup novoShield has released an iPhone app that protects users against malicious websites.
In-app browser security risks, and what to do about them
Data security and privacy risks surrounding in-app browsers have been making headlines. These are the threats they pose and steps needed to minimize them.
Top 5 security risks of Open RAN
Open RAN enables interoperability among hardware, software, and interfaces used in cellular networks but also changes their attack surface.
The Secret Service’s missing text messages: Lessons for IT security
The drama in Washington shines a light on the challenges in securing mobile communications and the role that document destruction and retention policies play in organizational security.
Mobile apps are a privacy nightmare. The Roe decision put them center stage.
Concerns about app data and location tracking put digital privacy rights in the cross hairs of abortion access debate
Italian spyware firm is hacking into iOS and Android devices, Google says
RCS Lab spyware uses known exploits to install harmful payloads and steal private user data, according to a Google report.
MITRE ATT&CK v11 adds ICS matrix, sub-techniques for mobile threats
The latest version of the MITRE ATT&CK Framework addresses two of the most pressing threat-actor targets: mobile devices and industrial control systems.
ESET refreshes enterprise products, embraces XDR
Auto-update, brute-force protection, and Android web control are among new features in ESET Protect.
Malware detections surge from "COVID Bounce"
A year after pandemic peak, malicious threats to businesses and consumers rose above pre-virus levels, especially for mobile devices.
6 key points of the new CISA/NSA 5G cloud security guidance
The security guidance focuses on zero-trust concepts as the US agencies anticipate growth of 5G networks.
Stealthy Trojan that roots Android devices makes its way on app stores
The criminals behind the Trojan have placed fully functional utilities that carry malicious code on the Google Play store in a way that evades detection.
How to hack a phone: 7 common attack methods explained
Mobile security often beats PCs, but users can still be fooled and smartphones can still be hacked. Here’s what you need to watch for.
FCC asks carriers to step up to stop SIM swapping, port-out fraud
The US federal agency puts pressure on telecom carriers to put better authentication, account protection safeguards in place.
5 riskiest mobile apps
Unsanctioned applications on corporate mobile devices is a security headache. Here are the five types of apps CISOs never want to find on corporate mobile devices, with strategies for mitigating the risks they pose.
Tech Primer
What it takes to become an information assurance analyst
This in-demand role calls for a rare combination of superior communication skills and security chops. Learn how one information assurance analyst landed his current job, the skills and training that helped him get there, and where his...
Tech Primer
Fraud prevention: Improving internal controls
Internal fraud controls aren't fire-and-forget. Smart collaboration and ongoing improvement will help keep fraud in check. Here are the basics.