Mobile Security

Mobile Security | News, how-tos, features, reviews, and videos

06 vpn

The best mobile VPNs for the enterprise and how to evaluate them

Do cloud-based mobile VPNs work for the enterprise? Many businesses are saying "yes," but you need to choose a moble VPN and how you use it carefully.

cybersecurity ts

5 worst cybersecurity habits with catastrophic consequences

These cybersecurity habits can have devastating effects. Make sure you — and your employees — aren't following them.

iphone security

Switch from Yahoo Mail to Gmail, and turn your phone into a physical key

Yahoo suffered the world's biggest hack on 3 billion users. If you still use Yahoo Mail, follow these steps to switch to Gmail — the safest choice for personal email.

1 transform phone payment

Software and the acceleration of payment security

As the way payments are accepted continues to change, the PCI Security Standards Council CTO discusses how the Council is supporting these advancements in payments with security standards to protect payment data.

android oreo livestream

Patch your Android or run Oreo, or you might OK your own pwnage

Unpatched Android devices not running Oreo are vulnerable to Toast overlay attacks.

06 authentication

How to protect your email account from Equifax hackers in 5 minutes

Use two-step verification to protect your email accounts from the Equifax hackers.

business meeting 146783744

Using identity to protect the mobile perimeter

It’s the biggest threat surface and best enforcement point for enterprise security

intro sneaky malware2

WireX shines a spotlight on app security

The WireX botnet, which used compromised apps to hijack smartphones to send bad traffic in the execution of DDoS attacks, introduced a new threat: weaponized smartphones. WireX and malware like it illustrate the need for mobile...

android oreo livestream

Security firms team up to neutralize WireX botnet after multiple DDoS attacks

Researchers from Akamai, Cloudflare, Flashpoint, Google, Oracle (Dyn), RiskIQ, Team Cymru, and others worked together to take down an Android-based botnet responsible for several DDoS attacks earlier this month.

mobile security data protection [Thinkstock]

Mobile security for the road warrior

Follow these easy, inexpensive tips for keeping your smartphones and computers safe while traveling.

mobile device management

Security on the move: protecting your mobile workforce

Organizations have never faced as daunting of a task as securing their critical assets while users bring in uncontrolled and hard-to-monitor mobile devices into their enterprise networks. But it’s not hopeless. Getting back to some...

mobile security phones

Five new threats to your mobile security

Cyber criminals are stepping up their attacks on mobile devices with new weapons and variations on old ones.

mobile device management

Is your cellphone number just as valuable as your social security number?

Recent news coverage has touted that cell phone numbers are just as valuable to hackers and identity thieves as Social Security Numbers. But, that's not the case at all.

pokemon go pikachu

What is gamification? Lessons for awareness programs from Pokemon Go

Gamification is a way to reward people for exhibiting a desired behavior. It is not merely creating a game for people to play, nor making training a game. As Pokemon Go turns a year old, here are some of the things awareness programs...

Mobile security

SandBlast Mobile simplifies mobile security

Check Point's SandBlast Mobile fits in between mobile device managers and security event log analyzers, and actually makes it easier to manage the overall security footprint of your entire mobile device fleet.

The Internet of Identities (IoI)

IoT, mobility, cloud and pressing security needs mean that every node must have a trustworthy identity and a secure path to network services.

Is cell phone spoofing a mobile security risk [or just annoying]?

Sprint responds to a customer's complaint of mobile phone calls and text messages from unknown callers. Here's what the carrier offers for advice.

peeling back good times ahead bright future

Imagining frictionless authentication

Passwords are lame. The username/password combination is outdated and is now the weakest link in security. There's got to be a better way, right?

cybersecurity

How quantum computing increases cybersecurity risks

Quantum computers are expected to arrive within nine years, and organizations better have quantum-safe security if they want to keep their data safe.

galaxy s8 iris2

Hackers trick iris scanner to unlock Samsung Galaxy S8

Chaos Computer Club easily broke Samsung's Galaxy S8 iris recognition authentication. Same hack could unlock the Samsung Pay mobile wallet.

Load More
You Might Also Like