Mobile Security

Mobile Security news, analysis, research, how-to, opinion, and video.

thieving magpie
man person clouds tablet

fbi trump iphone

A year after terrorist attacks, phone privacy laws unchanged – but watch out for Trump

Although the perpetrators of the San Bernardino mass shooting were killed in a gun battle with law enforcement within hours of the attack, the FBI’s interest in one terrorist’s iPhone precipitated a public standoff with Apple that...

android security

When it comes to security, Android is the new Windows

Android keeps improving security, but it suffered several notable issues this month.

cybersecurity budgets

Security budgets continue to grow, but is it enough?

Cybersecurity is now a top concern for businesses, but the reality is that it should have been on their radar years ago. Why did businesses wait so long to invest in cybersecurity?

Goodbye, NAC. Hello, software-defined perimeter

Like NAC, software-defined perimeter (SDP) is a bit of a niche today. But cloud, IoT and mobility will likely drive massive SDP proliferation over the next few years.

01 pragmatic

How to maintain data and document security with a mobile workforce

As security leaders, we want to allow your teams to move as fast as possible and not deploy a policy or technology because someone touts it as the best way to do something. CRM vendor Conga provides these tips for that healthy balance....

smartphone digital

Black Hat Europe: IoT devices can hack phones

The Internet of things (IoT) has already been used to launch the biggest DDoS attacks ever, but now it represents a potential path for attackers to compromise cell phones.

Various smartphones

Do smartphone trade-ins threaten corporate security?

One more mobile security thing to worry about: corporate data on smartphones sold when workers trade in their phones.

00 intro safeguards

10 ways to make sure your remote workers are being safe

Wombat Security Technologies recommends remote employees follow these 10 best practices to shore up security for their organizations — and themselves.

bullseye hospital healhcare

Unencrypted pagers a security risk for hospitals, power plants

For most of us, pagers went out when cell phones came in, but some companies are still using them and when the messages sent without encryption, attackers can listen in and even interfere with the communications

0 pixel phones

Security apps you need on your new Pixel

Privacy and security apps that should be the first apps on Google's new phone to help avoid growing mobile security threats, including identity theft, hacks and breaches.

bank ts

Russian criminals' bank attacks go global

Russian cybercriminals have field tested their attack techniques on local banks, and have now begun taking them global, according to a new report -- and a new breed of mobile attack apps is coming up next.

mean angry pig

Backdoor dubbed Pork Explosion lets attackers go hog wild on Android phones

A backdoor in Android firmware provided by manufacturer Foxconn allows attackers to root devices to which they have physical access, according to a security researcher and BBQ enthusiast who dubbed the vulnerability Pork Explosion.

emm for smbs

5 affordable MDM options for small businesses

Small and medium sized businesses have embraced BYOD faster than large corporations, but research suggests SMBs aren't taking security seriously. Here are five affordable and easy-to-deploy BYOD management solutions that will get your...

windows 10 anniversary edition connect

7 enterprise mobile management features in Windows 10

Redstone 2 has been delayed until Spring 2017, but the most recent Microsoft operating system update, Redstone 1, also dubbed the Windows 10 Anniversary Update 1607, brings plenty of enterprise IT updates – including these seven EMM...

passwords authentication

Many people abandon security, risky behavior surges

‘Security fatigue’ is behind an increase in risky online and computer behavior, a new NIST study finds.

body lead image

Passwords will be wirelessly transmitted through bodies

Human body-confined wireless makes for ultra-secure authentication, say scientists—much more secure than passwords transmitted via traditional Wi-Fi or Bluetooth.

00 intro

10 ways to secure a mobile workforce

As much as you might want to implement all the latest best practices and lock down your company like Fort Knox, you need to align your policies to your company culture.

3d printer lead image

3D printers hackable via smartphone

Hackers can use a smartphone to capture electromagnetic energy and sound emanating from a 3D printer nozzle, allowing them to steal intellectual property.

Load More