Mobile Security

Mobile Security news, analysis, research, how-to, opinion, and video.

Princeton Petta Lab
android privacy

Wandera helps manage the risks a mobile fleet poses to corporate data  

The company offers a secure mobile gateway in the cloud that customers route data through, and a corresponding app that gets installed on end user devices

nordvpn

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

NordVPN has discounted their popular VPN software 72% for the holidays. Use our link and see the discount applied when you click "buy now".

170104 blackberry 2

TCL targets Apple, Samsung with new BlackBerry handset

For a brand that's been written off by many, TCL Communication has big plans for BlackBerry.

thieving magpie

U.S. and U.K. spy agencies have been intercepting in-flight phone calls for years

U.S. and U.K. spy agencies have been monitoring in-flight mobile phone users for years, according to new revelations from the trove of documents leaked by former NSA contractor Edward Snowden.

man person clouds tablet

Security pros most worried about clouds, mobile

Companies were least prepared to assess the security risks of cloud and mobile technologies, according to a survey of cybersecurity professionals released this morning. Overall, the confidence levels of security professionals that...

fbi trump iphone

A year after terrorist attacks, phone privacy laws unchanged – but watch out for Trump

Although the perpetrators of the San Bernardino mass shooting were killed in a gun battle with law enforcement within hours of the attack, the FBI’s interest in one terrorist’s iPhone precipitated a public standoff with Apple that...

android security

When it comes to security, Android is the new Windows

Android keeps improving security, but it suffered several notable issues this month.

cybersecurity budgets

Security budgets continue to grow, but is it enough?

Cybersecurity is now a top concern for businesses, but the reality is that it should have been on their radar years ago. Why did businesses wait so long to invest in cybersecurity?

Goodbye, NAC. Hello, software-defined perimeter

Like NAC, software-defined perimeter (SDP) is a bit of a niche today. But cloud, IoT and mobility will likely drive massive SDP proliferation over the next few years.

01 pragmatic

How to maintain data and document security with a mobile workforce

As security leaders, we want to allow your teams to move as fast as possible and not deploy a policy or technology because someone touts it as the best way to do something. CRM vendor Conga provides these tips for that healthy balance....

smartphone digital

Black Hat Europe: IoT devices can hack phones

The Internet of things (IoT) has already been used to launch the biggest DDoS attacks ever, but now it represents a potential path for attackers to compromise cell phones.

Various smartphones

Do smartphone trade-ins threaten corporate security?

One more mobile security thing to worry about: corporate data on smartphones sold when workers trade in their phones.

00 intro safeguards

10 ways to make sure your remote workers are being safe

Wombat Security Technologies recommends remote employees follow these 10 best practices to shore up security for their organizations — and themselves.

bullseye hospital healhcare

Unencrypted pagers a security risk for hospitals, power plants

For most of us, pagers went out when cell phones came in, but some companies are still using them and when the messages sent without encryption, attackers can listen in and even interfere with the communications

0 pixel phones

Security apps you need on your new Pixel

Privacy and security apps that should be the first apps on Google's new phone to help avoid growing mobile security threats, including identity theft, hacks and breaches.

bank ts

Russian criminals' bank attacks go global

Russian cybercriminals have field tested their attack techniques on local banks, and have now begun taking them global, according to a new report -- and a new breed of mobile attack apps is coming up next.

mean angry pig

Backdoor dubbed Pork Explosion lets attackers go hog wild on Android phones

A backdoor in Android firmware provided by manufacturer Foxconn allows attackers to root devices to which they have physical access, according to a security researcher and BBQ enthusiast who dubbed the vulnerability Pork Explosion.

emm for smbs

5 affordable MDM options for small businesses

Small and medium sized businesses have embraced BYOD faster than large corporations, but research suggests SMBs aren't taking security seriously. Here are five affordable and easy-to-deploy BYOD management solutions that will get your...

Load More