Mobile Security

Mobile Security news, analysis, research, how-to, opinion, and video.

Android Security Audit

iOS VPNs: Which option is best for your enterprise?

Virtual private networks (VPNs) play an essential role in enabling staff to use mobile devices to securely access corporate resources, and when it comes to Apple devices, the VPN options have evolved with time.


ios7 iphone touchid hero 100055380 gallery 100349723 large

Apple confirms iPhone-killing “Error 53,” says it’s about security

The iPhone’s mysterious "Error 53" bug is tied to Touch ID tampering, at least according to Apple.

linux penguin shoot

Linux zero-day affects most Androids, millions of Linux PCs

A new zero-day vulnerability has been discovered that allows Android or Linux applications to escalate privileges and gain root access, according to a report released this morning by Perception Point.

apps and data representations being erased from a chalkboard

Containerization moves beyond the full erase

The latest containerization technologies enable IT to create separate, protected areas for work apps and data on employees' personal devices. The challenge is to maintain security.

securitiy concerns

5 biggest cybersecurity concerns in 2016

Carl Leonard, a principal security analyst for Raytheon's Websense cybersecurity software unit, offers insight into the most serious threats CIOs and CISOs are likely to grapple with this year.

fraud infog primary

The year in security, identify theft and fraud

There’s a lot we can say about cybersecurity, identify theft and fraud in 2015, but we’re going to let our infographic tell the story.

00 predictions title

Security predictions that could make or break your company

Here are some best guesses about 2016 from more than a dozen vendors and analysts.

Security in 2015

What security research shows for 2015

Security researchers were almost as busy as cybercriminals in 2015. Here are some of the noteworthy numbers of the past year.

smartphone encryption

Essential tools for everyday encryption

Thanks to technical advances and increased adoption, securing your data and communications is a lot easier than you might think

150817 google marshmallow 06

Google patches critical media processing and rooting vulnerabilities in Android

A new batch of security fixes for Android address flaws that could allow attackers to compromise devices via rogue emails, Web pages, and MMS messages.

blackberry priv keyboard full

BlackBerry PRIV review: A new standard for Android in enterprise?

CIO.com spent a month testing BlackBerry's first Android smartphone with a focus on the businesspeople and IT managers who will use and support it. The PRIV is the most capable BlackBerry ever, but does it deliver on what may be its...

google education

Google accused of tracking school kids after it promised not to

Google has been collecting information about schoolchildren's browsing habits despite signing a pledge saying it was committed to their privacy, the EFF said Tuesday.

Privacy (4)

IRS says it will get a warrant before using cell-site simulators

The U.S. Internal Revenue Service is drafting a policy to restrict the use without a warrant of cell-site simulator technology to snoop on the location and other information from mobile phones.

security cloud ts

Applying more Critical Security Controls to your organization

Experts at Center for Internet Security put out a list of best practices called Critical Security Controls. Among them: keep checking for vulnerabilities, control privileges, and monitor your logs

5 childrens gadget

Most hackable devices

Many holiday gifts purchased this season are likely to be connected devices, including smart TVs, tablets, smartphones, notebooks and laptops, and video game consoles. Unfortunately, many of these devices will make homes more...

hacking connected car

4 simple ways to secure your Internet-connected car

Cars with systems that connect to the Internet are potentially vulnerable to intrusions by hackers. Here are four steps to help protect your automobile without spending a dime.

150902 encrypt android

Feds fund encryption apps that could cloak terrorists

U.S. government funds have recently been used to support the creation and maintenance of commercially available smartphone encryption apps -- the same kinds of apps thought to be used by terrorists.

smartphone encryption

Paris attacks demand 'wake-up call' on smartphone encryption

Deadly terrorist attacks on Friday in Paris, apparently planned by ISIS, have ignited a new round of concerns over smartphone encryption.

byod security

Half of U.S. businesses have no formal BYOD policy for security

Years after the widespread adoption of workplace smartphones, more than half of U.S. companies said they have no formal BYOD (bring your own device) policy to safeguard their enterprises, according to a survey.

Load More