Mobile Security

Mobile Security | News, how-tos, features, reviews, and videos

businesswoman mobile apps

Mobile app trackers can lead to significant data loss

More likely than not, your apps are tracking you. But where is your data going?

artificial intelligence / machine learning / network

5 top machine learning use cases for security

Machine learning will make sense of the security threats your organization faces and help your staff focus on more valuable, strategic tasks. It could also be the answer to the next WannaCry.

us flag surveillance camera

Texas National Guard deployed cellphone spying devices on surveillance planes

The Texas National Guard spent $373,000 for "stingray" devices deployed on surveillance planes, which are capable of intercepting calls and capturing text messages.

hand holding smartphone with Android logo and secure padlock

Best Android security app? Why you're asking the wrong question

If you really want to keep your company's Android devices safe, third-party security apps shouldn't be your focus.

mobile pwn2own 2017 day 1

Apple, Samsung and Huawei phones fall on day one of Mobile Pwn2Own

Apple's iPhone 7 running iOS 11.1, the Samsung Galaxy S8 and the Huawei Mate 9 Pro were hacked on the first day of Mobile Pwn2Own.

wearables and security primary2

FTC urged to investigate easy-to-hack smartwatches for kids

A new report revealed significant security and privacy flaws in smartwatches for kids, prompting U.S. watchdog groups to ask the FTC to investigate.

06 vpn

The best mobile VPNs for the enterprise and how to evaluate them

Do cloud-based mobile VPNs work for the enterprise? Many businesses are saying "yes," but you need to choose a moble VPN and how you use it carefully.

cybersecurity ts

5 worst cybersecurity habits with catastrophic consequences

These cybersecurity habits can have devastating effects. Make sure you — and your employees — aren't following them.

iphone security

Switch from Yahoo Mail to Gmail, and turn your phone into a physical key

Yahoo suffered the world's biggest hack on 3 billion users. If you still use Yahoo Mail, follow these steps to switch to Gmail — the safest choice for personal email.

1 transform phone payment

Software and the acceleration of payment security

As the way payments are accepted continues to change, the PCI Security Standards Council CTO discusses how the Council is supporting these advancements in payments with security standards to protect payment data.

android oreo livestream

Patch your Android or run Oreo, or you might OK your own pwnage

Unpatched Android devices not running Oreo are vulnerable to Toast overlay attacks.

06 authentication

How to protect your email account from Equifax hackers in 5 minutes

Use two-step verification to protect your email accounts from the Equifax hackers.

business meeting 146783744

Using identity to protect the mobile perimeter

It’s the biggest threat surface and best enforcement point for enterprise security

intro sneaky malware2

WireX shines a spotlight on app security

The WireX botnet, which used compromised apps to hijack smartphones to send bad traffic in the execution of DDoS attacks, introduced a new threat: weaponized smartphones. WireX and malware like it illustrate the need for mobile...

android oreo livestream

Security firms team up to neutralize WireX botnet after multiple DDoS attacks

Researchers from Akamai, Cloudflare, Flashpoint, Google, Oracle (Dyn), RiskIQ, Team Cymru, and others worked together to take down an Android-based botnet responsible for several DDoS attacks earlier this month.

mobile security data protection [Thinkstock]

Mobile security for the road warrior

Follow these easy, inexpensive tips for keeping your smartphones and computers safe while traveling.

mobile device management

Security on the move: protecting your mobile workforce

Organizations have never faced as daunting of a task as securing their critical assets while users bring in uncontrolled and hard-to-monitor mobile devices into their enterprise networks. But it’s not hopeless. Getting back to some...

mobile security phones

Five new threats to your mobile security

Cyber criminals are stepping up their attacks on mobile devices with new weapons and variations on old ones.

mobile device management

Is your cellphone number just as valuable as your social security number?

Recent news coverage has touted that cell phone numbers are just as valuable to hackers and identity thieves as Social Security Numbers. But, that's not the case at all.

pokemon go pikachu

What is gamification? Lessons for awareness programs from Pokemon Go

Gamification is a way to reward people for exhibiting a desired behavior. It is not merely creating a game for people to play, nor making training a game. As Pokemon Go turns a year old, here are some of the things awareness programs...

Load More