Mobile Security

Mobile Security | News, how-tos, features, reviews, and videos

secusuite for samsung knox 1

BlackBerry readies a more secure version of the Samsung Galaxy S7

Secusmart, the BlackBerry subsidiary that secures the German Chancellor Angela Merkel's smartphone, will roll out a version of its SecuSuite security software compatible with Samsung Electronics' Knox platform later this year.

20160225 stock mwc ericsson booth security locks

How much are vendor security assurances worth after the CIA leaks?

Google, Apple, Microsoft and other software vendors are working to identify and patch the vulnerabilities described in the CIA leak, but ultimately this doesn't change the status quo of software security.

phone picture conference

Protecting the enterprise against mobile threats

Mobile devices have transformed the digital enterprise allowing employees to access the information they need to be most productive from virtually anywhere. Has that convenience come at a cost to enterprise security, though?

20170225 mwc 2017 sign closeup

Mobile World Congress 2017: Mobility monsters

GSMA has brought everything mobile to Mobile World Congress 2017 in Barcelona, painting a picture of mobile world domination.

cog systems d4 secure htc a9 ip address

Cog Systems offers more secure version of HTC A9 smartphone

It sounds like a smartphone user's worst fear: Software that starts up before the phone's operating system, intercepting and encrypting every byte sent to or from the flash memory or the network interface. This is not some new kind...

digital data surveillance eye

The future of biometrics and IoT

Many people are familiar with biometrics as a security measure at airports or police stations, where they often use a fingerprint as a form of identification, but there are many other uses outside of law enforcement.

connected cars 10

Are you afraid your car will be taken over?

A consortium was recently created to make sure that your car stays on the road and in your control.

heart monitor rate ekg hospital medical

FDA 'guides' the way to medical device security

The FDA’s “guidance” documents on medical device security are non-binding. But advocates say they will still have plenty of legal force – especially when it comes to things like insurance or civil suits for damages from insecure...

1 byod

7 ways MDM threatens employee privacy

To understand the extent to which MDM solutions could monitor and control BYOD devices, the Bitglass research team installed MDM software on several employees’ personal mobile devices with their permission. The outcome? Complete...

bodium castle fortress

How Google reinvented security and eliminated the need for firewalls

In some ways, Google is like every other large enterprise. It had the typical defensive security posture based on the concept that the enterprise is your castle and security involves building moats and walls to protect the perimeter. ...

security light

25% off Kuna Smart Home Security Outdoor Light & Camera - Deal Alert

Night or day, Kuna’s smart outdoor security camera system detects movement at your door and sends actionable alerts to your mobile device, allowing you to safely take action using Kuna’s lights, HD live video feed, two-way intercom,...

BlackBerry

BlackBerry offers secure mobile communications platform for developers

BlackBerry announced a new line of business to provide developers with a secure, cloud-based, mobile communications platform for texting, voice, video and file sharing.

01 workforce

7 musts for any successful BYOD program

Mobile devices, mobile apps and the networks they use are now essential to satisfy customers, collaborate more effectively with suppliers, and keep employees productive anytime and anywhere.

Are you a Reckless Rebel or a Nervous Nellie when it comes to online privacy?

In an era of constant likes and shares, where is the privacy line drawn? Are you someone who worries about being watched as you purchasing an item online? Or do you consider loss of privacy the price you pay for having the world at...

nissan leaf autonomous drive

How to protect your data, your vehicles, and your people against automotive cyber threats?

CSO explores the vulnerabilities and risks of automotive cyber-attacks and methods for securing your data, human resources, and the connected vehicle environment.

01 branches

How to keep branch offices as secure as corporate HQ

Satellite worksites can cause big headaches for tech pros tasked with keeping company assets secure. We talked to a number of tech pros to find out more about the dangers—and the solutions.

Princeton Petta Lab

7 really cool network and IT research projects

Researchers at top universities, backed by funding from federal and other outfits, are pumping out loads of research on network security, wireless networking and more. Here's a recap of 7 impressive projects from recent months.

android privacy

How to set up your Android phone for ultimate privacy

Here's how to replace all of those data-hungry apps and services with ones that don't need to know so much about you.

Wandera helps manage the risks a mobile fleet poses to corporate data  

The company offers a secure mobile gateway in the cloud that customers route data through, and a corresponding app that gets installed on end user devices

170104 blackberry 2

TCL targets Apple, Samsung with new BlackBerry handset

For a brand that's been written off by many, TCL Communication has big plans for BlackBerry.

Load More