Mobile Security

Mobile Security | News, how-tos, features, reviews, and videos

QR code on mobile phone [CC0 image by Gerd Altmann via Pexels]
android trojan banking hack virus bank breach by etienne martin unsplash and google android

mobile security

Mobile security failings putting enterprises at risk

A typical mobile security breach in a large organization can cost millions of dollars. Mobile Security can be a daunting task with many potential pitfalls to protect against. Knowing the key security exposure mechanisms can help you...

CIO | Middle East  >  A woman uses a mobile phone amidst abstract binary data and processing arrows.

Want better mobile security or privacy? Try these Android and iOS alternatives

GrapheneOS offers hardened security over Android, while /e/OS locks down your private information. The main trade-off for both is fewer apps.

Smishing  >  A woman looks at her mobile phone in horror when receiving a malicious SMS text message

What is smishing? How phishing via text message works

Don't let the cute name fool you, smishing is a cyberattack that uses misleading text messages to trick victims into sharing valuable information, installing malware, or giving away money.

Android mobile phone code

Android security: Patching improves, but fragmentation challenges remain

A new report shows that Android mobile device manufacturers are getting better at patching the OS, but patching levels vary across models and vendors.

Multifactor authentication  >  Mobile phone verification of a permission request for laptop login.

The trouble with 2fa

With a large percentage of your workforce now working remotely, two-factor authentication (2fa) can make them (or your company data) safer online. But how you're doing it now probably isn't helping much at all.

COVID-19 coronavirus [morphology/visualization]

3 ways COVID-19 is changing CISO priorities

The scramble to enable remote workers changes security strategies, priorities, and workflows for 2020.

5G light trails

4 ways 5G will change your enterprise threat model

The benefits that fifth-generation cellular networks will enable come with security risks that organizations need to pay attention to right now.

CSO  >  Android antivirus conceptual image

Best Android antivirus? The top 8 tools

There are plenty of antivirus tools for Android. Here's how the top 8 measure up in protection, usability and features.

mobile security

8 mobile security threats you should take seriously in 2020

Mobile malware? Some mobile security threats are more pressing. Every enterprise should have its eye on these eight issues.

5G mobile wireless network

5G security is a mess. Could digital certificates help?

5G inherited security vulnerabilities from earlier mobile technology, but digital certificates might solve the issue of unauthenticated messages.

IDG Tech Spotlight  >  Security  >  Cybersecurity in 2020: From secure code to defense in depth

Cybersecurity in 2020: From secure code to defense in depth

CIO, Computerworld, CSO, InfoWorld, and Network World tackle the hot security issues, from prioritizing risk to securing digital transformation.

security threats and vulnerabilities

7 mobile security threats that may catch you by surprise

Even if you're usually savvy about cybersecurity, anyone can have a vulnerable moment (in our writer's case, it was his mother's funeral).

android trojan banking hack virus bank breach by etienne martin unsplash and google android

Emergent Android banking Trojan shows app overlay attacks are still effective

By taking code from another Android Trojan, Anubis, the Ginp malware has enhanced itself and has begun targeting banks.

business travel / airport terminal walkway / traveller

What you need to know about new data-security rules for business travel

From U.S. Customs agents to cybercriminals, everyone wants to copy the data on your phone and laptop. Here’s how to protect your rights and also avoid industrial espionage.

budget piggy bank spending savings security spending

Security spending up, but adoption of cutting-edge tools is slow

While security budgets are expected to increase over the next year, it’s not clear that spending is aimed at the right problems or that IT is up-to-date on the latest security practices. (Download our research report.)

endpoint security hacker vulnerablility secure mobile security app

Will 5G increase mobile security?

We love our smartphones, but there's a dark side. Their prevalence and users’ tendencies to connect over public Wi-Fi make mobile devices a common target of bad guys. Analyst Jack Gold looks at how to mitigate the risk.

VPN / Virtual Private Network  > A mobile phone connecting via VPN / network connections.

Top mobile VPNs for the enterprise

Any of these six VPNs can securely connect mobile devices to your enterprise network if it supports the configuration options you need.

mobile security threat detection

Can you be mobile AND secure?

Despite the security challenges mobile devices create, there is no going back. Users demand corporate access from their smartphones and companies benefit from this access with increased efficiency, better use of time and improved user...

Load More
You Might Also Like