Mobile Security

Mobile Security news, analysis, research, how-to, opinion, and video.

threat detection intelligence alert

VPN users, beware: You may not be as safe as you think you are

Thanks to IPv6 leakage, your data could be out there for anyone to see


One third of enterprise iOS devices vulnerable to app, data hijacking attacks

Researchers from FireEye found five flaws that can be exploited by rogue apps installed through the iOS enterprise provisioning system

Apple releases tons of security updates for recent flaws and exploits

Along with Apple Music came fixes for a laundry list of exploits and a long-overdue change to Apple's digital certificate policy.

Microsoft Surface Pro 3

How to deploy tablets to your mobile workforce

Wakefield Canada needed a new tablet PC for use in the field. Who better to ask then the very folks who’d have to use the mobile devices? Here’s what they chose and why.

glacier bridge

Workarounds, kludges, and hacks that will improve your life

Whether you want to lower your cell phone bill or find true love, there's usually a way around your problems

FIDO two-factor authentication goes wireless

The FIDO Alliance is issuing a new specification for FIDO to support Bluetooth, low-energy Bluetooth (BLE) and near field communications (NFC) wireless technologies in two-factor authentication tokens, according to FIDO Alliance...

FTC settles with developers of sneaky cryptocurrency mining app

The Prized app secretly mined virtual currencies on mobile phones

battle war fight

Who’s winning the mobile payments war?

It’s still early, but Apple seems to be gaining momentum. Other players to watch: Google, PayPal, Walmart, Microsoft.

How to use a smart chip card

Some users will 'kick and scream' at paying with slower chip cards

Major U.S. banks have been rolling out new, secure smart chip debit and credit cards for months, but the real end-user impact hasn't yet been felt.

Virtual Mobile Infrastructure: Secure the data and apps, in lieu of the device

VMI offers an effective, efficient way to provide access to sensitive mobile apps and data without compromising security or user experience

apple watch pay

Mobile security: the coming battle of hardware versus software

According to security experts, there are several paths forward for mobile payments, each with its own security implications

Dropbox for Business to get mobile management boost

Applications are on the way from partners including AirWatch and MobileIron

mobileiron

Enterprise mobility slowed by security concerns

While mobile technology continues to move forward in all parts of the business, security issues threaten to slow the progress, according to attendees at this week's MobileIron's user conference.

internet security with lock

How to use enterprise Wi-Fi security in SMBs

No matter what size your business, using WPA2 security is a good first step to protecting your Wi-Fi network. Don't blow it by using the standard's not-so-secure PSK mode.

android security

'90s wonder Lycos launches wearables for Android security

Lycos' wristband and ring are designed around NFC communication and secure passwords for Android smartphones.

Apple moves to six-digit passcode in iOS 9

The pool of possible six-digit combinations is 1 million, rather than 10,000 for four digits, Apple said

mobility checkup image.jpg

Please take our Mobility survey

IDG Enterprise (which includes NetworkWorld, Computerworld and other news websites for IT pros) is in the process of fielding a survey with the objective of gauging strategy, challenges and drivers with regard to mobile technologies....

PrivacyHawk for Android

What apps sell or steal your data or take over your phone? PrivacyHawk can tell you

30% of free mobile apps capture and sell personal info from your phone, but a free app dubbed PrivacyHawk can identify risky Android apps that leak, sell, or steal your personal data, as well as those that can take over your phone.

Fraud campaign installs rogue app on non-jailbroken iPhones

The attackers are likely abusing Apple's iOS Developer Enterprise Program, researchers said

Load More