Mobile Devices

Case study: Get smart

Case study: Get smart

By

An organizing solution was found to manage mobile devices being used in Florida's Hillsborough School District, reports Greg Masters.

The high-tech hydra: BYOD

The high-tech hydra: BYOD

By

No a business' size, employees are yearning to connect their personal devices to the corporate network. But fear not: Solutions and best practices are starting to emerge to manage the risk attached with this craze.

Laptop stolen from Tennessee hospital

By

The breach compromised the personal information of about 27,000 patients at Blount Memorial Hospital in Maryville, Tenn.

Six months after backup tapes go missing, TD Bank alerts customers

By

TD Bank has begun notifying customers that it lost two backup computer tapes containing their personal information

Rapid7, Veracode complete mobile security purchases

By

Rapid7, a Boston-based vulnerability management and penetration testing company, has acquired Seattle start-up Mobilisafe, which makes cloud-based mobile risk management technology.

Samsung fixed reset flaw in Galaxy S3, other updates pending

By

The vulnerability, which affects various Galaxy models, could allow an attacker to initiate a factory reset on phones, remotely wiping them, if they are able to trick a victim into visiting a malicious web page.

Pay-per-install pays big bucks in the mobile world

By

If you thought malware installation networks were big business in the PC realm, mobile fraudsters are earning up to 10 times as much to infect Android devices.

Security firm notes sharp increase in SMS phishing attacks

By

Researchers at security firm Cloudmark have seen a 913 percent increase in daily SMS phishing reports.

McAfee: Malware breaking records, again

By

Security firm McAfee said it's amassed 1.5 million more malware samples in the second quarter of this year compared to the first quarter.

FTC offers guidance for mobile application development

By

The best practices ask developers to weigh the privacy and security risks before rolling out apps to employees and customers.

iPhone SMS spoofing tool released

Admitting to the vulnerability, Apple is suggesting that users employ iMessage as a workaround.

Stanford Hospital computer with patient data stolen

By

The computer theft marks the second breach of patient data in a year at Stanford Hospital.

Thumb drive with data on 14k hospital patients stolen

By

A USB drive with data on 14,300 patients of Oregon Health & Science University in Portland was stolen from the home of an employee on July 4 or 5.

Unencrypted EMC laptop stolen containing patient data

By

An unencrypted laptop containing the personal data of roughly 10,000 medical patients was stolen from a hospital vendor employee's home.

Embracing BYOD: Mobile challenge

Embracing BYOD: Mobile challenge

By

Businesses may no longer be able to turn away employees who want to bring their smartphones and tablets to work, and connect to the corporate network. But is that actually a good thing?

Assurance on the shore

Assurance on the shore

By

While the town of Brick on the New Jersey shore maintains a 1950s aura, with the growth of digital media, its public school system had to alleviate engorged traffic on its network, while safeguarding data.

Apple iOS Black Hat talk had bark, but no bite

Apple iOS Black Hat talk had bark, but no bite

By

The computing giant's first-ever foray into speaking at Black Hat about its security didn't reveal much more than what already was known.

Yahoo session hijacking likely culprit of Android spam

By

A faulty Yahoo Mail application available on Android devices may be the cause of spam messages that have turned up and appear to be sent from mobile phones.

Google, researchers question if Android spam botnet is real

By

The existence of an Android spam botnet is disputed, with some saying more proof is needed. No matter the truth, the incident underscores the dangers of installing mobile applications from unofficial sources.

Cyber security market to reach $120B by 2017

By

Driven by increasing use of cloud and mobile services, and cyber criminal activity from hacktivists, terrorist groups, nation-state actors and those out for financial gain, the global cyber security market is expected to grow by 11.3 percent each year.

Two-month delay in notifying patients after cancer center breach

By

An unencrypted laptop containing patient data was stolen in late April from the home of a doctor working for The University of Texas M.D. Anderson Cancer Center.

On-the-go defense

On-the-go defense

This featured article is a sample of our "Mobile Spotlight" issue and discusses mobile apps in the enterprise and how employees downloading them is cause for concern for IT departments.

Apple changes app permissions in iOS 6

Users of Apple's new mobile operating system, set for final release in the fall, will now be able to grant or deny apps from accessing personal data.

What does "bring-your-own-device" mean for enterprise security?

What does "bring-your-own-device" mean for enterprise security?

One of the hottest topics in the security industry revolves around employee-owned devices in the workplace, aka bring-your-own-device.

Me and my job: Matthew Dosmann, lieutenant colonel, U.S. Army

Me and my job: Matthew Dosmann, lieutenant colonel, U.S. Army

Me and my job: Matthew Dosmann, lieutenant colonel, U.S. Army

PCI releases help for retailers using mobile to take sales

By

The body that manages debit and credit card security standards on Wednesday released best practices for retailers wishing to accept payments via mobile devices.

BYOD savings may be lost by security and admin costs

BYOD savings may be lost by security and admin costs

Before flocking to a mobile policy in which employees are permitted to connect their smartphones and tablets to the corporate network, consider that the return on investment may not be all it is cracked up to be -- security being a big reason why.

Major software flaws in iPhones, iPads fixed in update

By

A difficult-to-find vulnerability, disclosed in March at Google's inaugural hacker competition, was among the iOS fixes.

Android malware spreads via website-injection campaigns

By

Mobile virus authors have adopted another tactic from their PC-sabotaging counterparts: infecting websites to spread their wares.

Laptop with patient data stolen from Howard University Hospital contractor

By

Letters have gone out to patients of Howard University Hospital in Washington, D.C., after their personal information was exposed when a laptop was stolen from the car of a contractor.

Sign up to our newsletters

POLL