Mobile Security

Mobile Security | News, how-tos, features, reviews, and videos

endpoint security hacker vulnerablility secure mobile security app

4 must-know facts about secure mobile printing

Mobile printing is making major strides right now. Is your company's mobile print security up to speed?

financial tech

List of 200 cybersecurity startups that received venture capital in 2017

VC firms and corporate investors are fueling a trillion-dollar cybersecurity market.

meltdown spectre

Meltdown and Spectre affect the smartphone in your pocket. Should you be worried?

Android and iOS devices are vulnerable to the latest hardware security flaw, and not all are easily patched. The good news: Exploits are hard (maybe) and so far none are known.

01 holiday phishing

The gift of digital safety

In a world that appears to be in a digital frenzy, let’s help each other be more aware of our digital surroundings so that we can continue to experience all of the joy that technology and the tides of this season bring.

6 password

Unraveling the truth about the NIST's new password guidelines

tl;dr: if you’re using a password manager, you should be in really good shape.

malware cybersecurity skull crossbone

Loapi malware capable of destroying Android phones

Kaspersky researchers discovered malware capable of cryptocurrency mining, launching DDoS attacks and so much more that it destroyed an Android phone after two days.

Future Wi-Fi

Time to close the gate on open wireless networks

Trusted networks are not always what they seem. Ask a hacker. They love your employees’ casual use of open wireless networks.

businesswoman mobile apps

Mobile app trackers can lead to significant data loss

More likely than not, your apps are tracking you. But where is your data going?

artificial intelligence / machine learning / network

5 top machine learning use cases for security

Machine learning will make sense of the security threats your organization faces and help your staff focus on more valuable, strategic tasks. It could also be the answer to the next WannaCry.

us flag surveillance camera

Texas National Guard deployed cellphone spying devices on surveillance planes

The Texas National Guard spent $373,000 for "stingray" devices deployed on surveillance planes, which are capable of intercepting calls and capturing text messages.

hand holding smartphone with Android logo and secure padlock

Best Android security app? Why you're asking the wrong question

If you really want to keep your company's Android devices safe, third-party security apps shouldn't be your focus.

mobile pwn2own 2017 day 1

Apple, Samsung and Huawei phones fall on day one of Mobile Pwn2Own

Apple's iPhone 7 running iOS 11.1, the Samsung Galaxy S8 and the Huawei Mate 9 Pro were hacked on the first day of Mobile Pwn2Own.

wearables and security primary2

FTC urged to investigate easy-to-hack smartwatches for kids

A new report revealed significant security and privacy flaws in smartwatches for kids, prompting U.S. watchdog groups to ask the FTC to investigate.

06 vpn

The best mobile VPNs for the enterprise and how to evaluate them

Do cloud-based mobile VPNs work for the enterprise? Many businesses are saying "yes," but you need to choose a moble VPN and how you use it carefully.

cybersecurity ts

5 worst cybersecurity habits with catastrophic consequences

These cybersecurity habits can have devastating effects. Make sure you — and your employees — aren't following them.

iphone security

Switch from Yahoo Mail to Gmail, and turn your phone into a physical key

Yahoo suffered the world's biggest hack on 3 billion users. If you still use Yahoo Mail, follow these steps to switch to Gmail — the safest choice for personal email.

1 transform phone payment

Software and the acceleration of payment security

As the way payments are accepted continues to change, the PCI Security Standards Council CTO discusses how the Council is supporting these advancements in payments with security standards to protect payment data.

android oreo livestream

Patch your Android or run Oreo, or you might OK your own pwnage

Unpatched Android devices not running Oreo are vulnerable to Toast overlay attacks.

06 authentication

How to protect your email account from Equifax hackers in 5 minutes

Use two-step verification to protect your email accounts from the Equifax hackers.

business meeting 146783744

Using identity to protect the mobile perimeter

It’s the biggest threat surface and best enforcement point for enterprise security

Load More
You Might Also Like