Mobile Security

Mobile Security news, analysis, research, how-to, opinion, and video.

spoofing 1
microsoft display dock block1 jpg

managed security service providers

Security training programs don't do enough to mitigate insider risk

The threats posed by negligent insiders top many security professionals' lists of security concerns, but even organizations that have data protection and privacy training programs aren't getting through to their employees.

Identity and access management infrastructure is misaligned with security

CISOs need to overhaul their entire Identity and Access Management (IAM) infrastructure to include multi-factor authentication, consolidated identity repositories, and on-premise and cloud-based IAM technologies.

privacy door

FBI/Apple privacy fight left out a major player: the data carriers

The debate over privacy does not begin and end with the recent battle between the FBI and Apple over unlocking an iPhone. The major carriers of the data in smartphones and other devices are also very involved in government access to...

managed security service providers

5 security experts share their best tips for ‘fringe’ devices

Some of the most hackable devices in your network are also probably the most-overlooked.

biometrics skull skullconduct security

Skull-produced sounds could replace existing biometric authentication

The unique sound made by your skull, created by audio beamed through bone, can authenticate a user, researchers say. It joins a slew of new kinds of biometrics being experimented with.

01 intro

7 ways to prevent mobile break-in

As mobile devices continue to penetrate our society, mobile security is becoming increasingly difficult to manage. Every mobile device we own, whether it’s a phone or a tablet, provides hackers with a new avenue to seize private...

CSO password management survival guide

The CSO password management survival guide

It's time to take the password problem in hand. This free guide from the editors of CSO will help you communicate the challenges and what is at stake and evaluate and choose the right enterprise password management solution for your...

video

Why passwords fail end users

At the 2016 Interop show, Network World got a quick demo of Keeper Security's password management and vault app. The company's CEO, Darren Guccione, also explained why most password methods fail end users, and whether biometrics...

A paranoid user with a laptop computer looks around suspiciously. [credit: Thinkstock]

5 secure habits of the paranoid PC user

Are you getting a little sloppy with your security? Time to shape up. Practice these five habits to protect your data at home, in the office and out in the world.

angle touchid

Why your iPhone-unlocking fingerprint is susceptible to FBI search warrants

A judge is forcing a woman to unlock an iPhone with her fingerprints, but does this violate the Constitution?

office printer

That printer in the corner is still a threat

Interestingly enough, because a printer is so innocuous and seemingly harmless, that’s the exact reason it poses a threat, according to the security analysts who talked to CSO about this issue.

more productivity tips

IT leaders pick productivity over security

Implementing security measures can make systems run slower and essentially bog down productivity, which is causing some enterprises to abandon effective security measures. Two recent studies highlight the severity of lacking...

150817 google marshmallow 03

Malvertising attack silently infects old Android devices with ransomware

Attackers are using two known exploits to silently install ransomware on older Android devices when their owners browse to websites that load malicious advertisements.

unlockjustice

NYPD hijacks #UnlockJustice to bash encryption, but its hashtag gets hijacked

A coalition, including the NYPD, launched a social media campaign denouncing encryption using the hashtag #UnlockJustice, and encryption supporters immediately took it over.

iphone security

Apple rebuts DOJ's appeal in N.Y. meth dealer's iPhone case

Apple opposed the Department of Justice's renewed demand that it assist investigators in accessing a drug dealer's iPhone, arguing that the government has not proved the company's help is required

01 whaling title

10 whaling emails that could get by an unsuspecting CEO

Email security company Mimecast has shared a handful of real-life examples of fraud attempts targeted at the person in the corner office.

mobile apps smartphone tablet users business

How to create enterprise apps employees want to use

A good consumer app keeps the user in mind through every stage of development to create the best experience possible. And enterprise apps should not be an exception to this rule. Here’s why.

bad security habits

5 security bad habits (and easy ways to break them)

Your end-users are often the weakest link in your organization's security strategy. Here are five solutions to help users strengthen their security posture.

Load More