Mobile

Mobile news, analysis, research, how-to, opinion, and video.

Anonymized identity
group chat services - Telegram

cwan 011 blockchain
video

What is blockchain technology?

Cryptocurrency such as Bitcoin has garnered most of the media coverage and hype to date, but keep your eye on blockchain – this new technology is poised to change IT in much the same way open-source software did a quarter century ago....

sequence 01.01 01 24 07.still001
video

CIO Leadership Live with Jack Clare, CIO and chief strategy officer at Dunkin' Brands | Ep 9

In this episode of CIO Leadership Live, host Maryfran Johnson talks with Jack Clare, CIO and chief strategy officer at Dunkin' Brands, about the company's mobile payment, ordering and loyalty apps, and how it's striving to improve...

Will LaSala
video

Defending against mobile technology threats | Salted Hash Ep 24

What are the current dangers in mobile technology and what are the strategies to keep yourself protected? Join host Steve Ragan from the show floor at RSA 2018, where he talks with Will LaSala, director of Security Solutions and...

iphone fingerprint 5s

Cops go into funeral home, attempt to unlock phone with dead man's fingerprint

Florida police entered a funeral home and attempted to unlock an iPhone using the dead man's fingerprint.

phishing man with life saver sinking danger helpless

The rise of mobile phishing attacks and how to combat them

Find out why phishing is starting to focus on mobile devices...and what you can do about it.

mobile security stock image one bad device

Don’t rush to deploy 5G if you want IoT security, agency warns

Flaws in 2G, 3G and 4G networks could be repeated in 5G, says EU IT security agency.

sequence 01.00 00 06 24.still001
video

Mingis on Tech: What's up with wireless charging?

With Apple embracing the Qi standard in the iPhone X and 8/8+, wireless charging is finally becoming more mainstream. But there's an ongoing debate about what it does to smartphone battery life.

mobile security threat detection

Keep your mobile workforce safe: understand the threats

As you review your mobile security strategy, make sure the solutions you choose shield devices from infected apps, man-in-the-middle attacks, OS exploits, malicious links in SMS messages and other exploits.

lmt booth mwc 2018

Latvian mobile operator invites cyber attackers to have a go

Security researchers wanting to test the kind of malware that could break public networks now have a place to do so in safety.

screen shot 2018 03 07 at 7.12.35 am
video

Tech Talk: Lessons from Mobile World Congress, and what’s next for developers

For developers, are these the best of times or the worst of times? Given how fast technology (and needed skills) change, it's an open question. Our tech trio weighs in – and talks about what we learned from this year's Mobile World...

template c100.00 01 13 23.still001
video

What is geofencing? Putting location to work

Geofencing is a service that triggers an action when a device enters a set location. From coupons and notifications, to engagement features and security alerts — businesses are finding creative ways to use these virtual boundaries.

Q&A

How do mobile apps impact security in the Industrial IoT?

New research from IOActive looks at the rise in vulnerabilities of mobile apps which connect to SCADA systems – we catch up with Jason Larsen to learn more

dex pad
video

Samsung's S9 arrives with a new version of DeX

Samsung's S9 arrives with a new version of DeX

smart plug

$29 For Two Etekcity Smart Plugs With Alexa Compatibility - Deal Alert

Turn your appliances on/off remotely from your mobile device, or with your voice via Alexa. Or automate with a schedule. The plug also monitors and helps control energy usage, and the slow drain that occurs even when devices aren't in...

sequence 01.00 00 31 14.still001
video

Mingis on Tech: A preview of Mobile World Congress 2018

This year's big show in Barcelona begins Feb. 26, and while hardware announcements are always part of the event, attendees are more likely to hear a lot about 5G networking.

ep 18 salted hash

Salted Hash Ep 18: Mobile security and privacy

Everyone, from activists, journalists, CEOs, and politicians, walk around with a computer in their pocket, sometimes calling it a phone. This week on Salted Hash, we talk about mobile privacy and security with the founder of The...

salted hash thumbnail final
video

Managing open-source mobile security and privacy for activists worldwide | Salted Hash Ep 18

Nathan Freitas, who heads The Guardian Project, talks with host Steve Ragan and senior writer J.M. Porup about the group's easy-to-use secure apps, open-source software libraries, and customized mobile devices being used around the...

endpoint security hacker vulnerablility secure mobile security app

4 must-know facts about secure mobile printing

Mobile printing is making major strides right now. Is your company's mobile print security up to speed?

Load More