Mobile Security
Mobile Security | News, how-tos, features, reviews, and videos
Best Android antivirus? The top 8 tools
There are plenty of antivirus tools for Android. Here's how the top 8 measure up in protection, usability and features.
5G security is a mess. Could digital certificates help?
5G inherited security vulnerabilities from earlier mobile technology, but digital certificates might solve the issue of unauthenticated messages.
Cybersecurity in 2020: From secure code to defense in depth
CIO, Computerworld, CSO, InfoWorld, and Network World tackle the hot security issues, from prioritizing risk to securing digital transformation.
7 mobile security threats that may catch you by surprise
Even if you're usually savvy about cybersecurity, anyone can have a vulnerable moment (in our writer's case, it was his mother's funeral).
Emergent Android banking Trojan shows app overlay attacks are still effective
By taking code from another Android Trojan, Anubis, the Ginp malware has enhanced itself and has begun targeting banks.
What you need to know about new data-security rules for business travel
From U.S. Customs agents to cybercriminals, everyone wants to copy the data on your phone and laptop. Here’s how to protect your rights and also avoid industrial espionage.
Security spending up, but adoption of cutting-edge tools is slow
While security budgets are expected to increase over the next year, it’s not clear that spending is aimed at the right problems or that IT is up-to-date on the latest security practices. (Download our research report.)
Will 5G increase mobile security?
We love our smartphones, but there's a dark side. Their prevalence and users’ tendencies to connect over public Wi-Fi make mobile devices a common target of bad guys. Analyst Jack Gold looks at how to mitigate the risk.
Top mobile VPNs for the enterprise
Any of these six VPNs can securely connect mobile devices to your enterprise network if it supports the configuration options you need.
Can you be mobile AND secure?
Despite the security challenges mobile devices create, there is no going back. Users demand corporate access from their smartphones and companies benefit from this access with increased efficiency, better use of time and improved user...
Are you being tracked through a Bluetooth security vulnerability?
The Bluetooth protocol, which was never that secure to begin with, now allows the bad guys to track your location on some laptops and phones, but worse could be the entry it offers into the IoT.
12 things every computer security pro should know
Fighting the good fight takes specialized knowledge. Here's the baseline of what all security pros should know.
CSO50 2019: Seeding security in the cloud
CSO50 award-winning companies are rising to the cloud security challenge and finding new ways to protect data and assets.
Review: Bitglass manages the mobility monster
The Bitglass platform secures and controls official work-related interactions between a mobile device and company resources without infringing on a user's smartphone or personal applications.
One in three organizations suffered data breaches due to mobile devices
New Verizon report shows a big gap between organizations' mobile security risk concerns and mobile security best practices they implement.
Australia and Huawei: Why the ban?
National security questions have resulted in mega smartphone manufacturer Huawei being banned by the Australian government from participating in the that nation’s 5G network rollout.
Apple disables Group FaceTime after eavesdropping bug discovered
A bug in Apple's Group FaceTime made eavesdropping easy. A patch is expected this week.
Why you shouldn’t use your face as your password
You can now use your face to lock your smartphone. But just because you can doesn’t mean you should.
Legalizing online sports betting means a new need for security
In the wake of SCOTUS paving the way to legalizing online sports betting in the U.S., states are figuring out the best approach to making it secure with authentication and identity verification.
Does your security solution protect against GDPR non-compliance?
Despite a seemingly complete overhaul of data security and privacy as the General Data Protection Regulation rolled out, many fall short when screening for compliance. How do you protect your organization, your clients and your...