Mobile Security

Mobile Security news, analysis, research, how-to, opinion, and video.

mobile pwn2own 2017 day 1

Apple, Samsung and Huawei phones fall on day one of Mobile Pwn2Own

Apple's iPhone 7 running iOS 11.1, the Samsung Galaxy S8 and the Huawei Mate 9 Pro were hacked on the first day of Mobile Pwn2Own.

wearables and security primary2

FTC urged to investigate easy-to-hack smartwatches for kids

A new report revealed significant security and privacy flaws in smartwatches for kids, prompting U.S. watchdog groups to ask the FTC to investigate.

06 vpn

The best mobile VPNs for the enterprise and how to evaluate them

Do cloud-based mobile VPNs work for the enterprise? Many businesses are saying "yes," but you need to choose a moble VPN and how you use it carefully.

cybersecurity ts

5 worst cybersecurity habits with catastrophic consequences

These cybersecurity habits can have devastating effects. Make sure you — and your employees — aren't following them.

iphone security

Switch from Yahoo Mail to Gmail, and turn your phone into a physical key

Yahoo suffered the world's biggest hack on 3 billion users. If you still use Yahoo Mail, follow these steps to switch to Gmail — the safest choice for personal email.

1 transform phone payment

Software and the acceleration of payment security

As the way payments are accepted continues to change, the PCI Security Standards Council CTO discusses how the Council is supporting these advancements in payments with security standards to protect payment data.

android oreo livestream

Patch your Android or run Oreo, or you might OK your own pwnage

Unpatched Android devices not running Oreo are vulnerable to Toast overlay attacks.

06 authentication

How to protect your email account from Equifax hackers in 5 minutes

Use two-step verification to protect your email accounts from the Equifax hackers.

business meeting 146783744

Using identity to protect the mobile perimeter

It’s the biggest threat surface and best enforcement point for enterprise security

intro sneaky malware2

WireX shines a spotlight on app security

The WireX botnet, which used compromised apps to hijack smartphones to send bad traffic in the execution of DDoS attacks, introduced a new threat: weaponized smartphones. WireX and malware like it illustrate the need for mobile...

android oreo livestream

Security firms team up to neutralize WireX botnet after multiple DDoS attacks

Researchers from Akamai, Cloudflare, Flashpoint, Google, Oracle (Dyn), RiskIQ, Team Cymru, and others worked together to take down an Android-based botnet responsible for several DDoS attacks earlier this month.

mobile security data protection [Thinkstock]

Mobile security for the road warrior

Follow these easy, inexpensive tips for keeping your smartphones and computers safe while traveling.

mobile device management

Security on the move: protecting your mobile workforce

Organizations have never faced as daunting of a task as securing their critical assets while users bring in uncontrolled and hard-to-monitor mobile devices into their enterprise networks. But it’s not hopeless. Getting back to some...

mobile security phones

Five new threats to your mobile security

Cyber criminals are stepping up their attacks on mobile devices with new weapons and variations on old ones.

mobile device management

Is your cellphone number just as valuable as your social security number?

Recent news coverage has touted that cell phone numbers are just as valuable to hackers and identity thieves as Social Security Numbers. But, that's not the case at all.

pokemon go pikachu

What is gamification? Lessons for awareness programs from Pokemon Go

Gamification is a way to reward people for exhibiting a desired behavior. It is not merely creating a game for people to play, nor making training a game. As Pokemon Go turns a year old, here are some of the things awareness programs...

Mobile security

SandBlast Mobile simplifies mobile security

Check Point's SandBlast Mobile fits in between mobile device managers and security event log analyzers, and actually makes it easier to manage the overall security footprint of your entire mobile device fleet.

The Internet of Identities (IoI)

IoT, mobility, cloud and pressing security needs mean that every node must have a trustworthy identity and a secure path to network services.

nordvpn

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN has discounted their popular VPN software 72%. Use our link and see the discount applied when you click "buy now".

Is cell phone spoofing a mobile security risk [or just annoying]?

Sprint responds to a customer's complaint of mobile phone calls and text messages from unknown callers. Here's what the carrier offers for advice.

Load More
You Might Also Like