Mobile Endpoint Security

Laptop containing health data stolen from Boston hospital

By

Beth Israel Deaconess Medical Center (BIDMC) in Boston is warning thousands of patients that their personal health information was contained on a laptop that was stolen.

Computer in your pocket

Computer in your pocket

By

It's not just data that is at risk with a mobile workforce, it's the whole shebang: data, applications, operating environments and, we hope, security.

BYOD savings may be lost by security and admin costs

BYOD savings may be lost by security and admin costs

Before flocking to a mobile policy in which employees are permitted to connect their smartphones and tablets to the corporate network, consider that the return on investment may not be all it is cracked up to be -- security being a big reason why.

Lawsuits in Sutter Health breach to be rolled into one

By

Following the theft of a computer at Sutter Health in October that put the personal information of more than 4.2 million patients at risk, 11 class-action lawsuits were filed against the Sacramento, Calif.-based nonprofit.

Android botnet may net millions yearly for its operators

By

Researchers from Symantec and North Carolina State University may have stumbled upon one of the largest and most lucrative mobile botnets yet.

Patient data at U of M hospital breached

By

A thief broke into a doctor's car and stole a briefcase containing a flash drive that held personal data on patients of University of Miami Miller School of Medicine.

Spam with QR code targets mobile users

Spam with QR code targets mobile users

By

Researchers have revealed a new type of spam campaign that appears to be a test run to find out how mobile users will respond to social engineering attempts on their smartphones and tablets.

'Tis the season for consumerization of IT

'Tis the season for consumerization of IT

With the holidays right around the corner, expect many workers to soon be returning from their breaks with shiny new personal devices, like an iPad, in hand -- and wanting to connect them to the corporate network. IT departments must have a response plan in place.

"Significant" security threats found in Android devices

By

Android phones from leading manufacturers -- including HTC, Motorola and Samsung -- contain pre-loaded applications that do not properly enforce the platform's permission-based security model.

Preparing for mobile security emergencies

Preparing for mobile security emergencies

Mobile malware authors have skipped the rudimentary phase and are immediately creating threats that mimic complex malicious code common in the traditional PC environment. But defense technologies are countering with sophistication of their own.

Twitter buys Whisper Systems for Android security

By

Twitter has acquired a start-up that makes security and management solutions for Android devices.

Adobe bids adieu to Flash for mobile

By

With the exception of issuing critical security fixes for existing installations, Adobe will no longer develop new versions of Flash for mobile.

HTC working with carriers to push Android bug fix

By

Users of HTC-made Android devices are receiving software security updates to correct a vulnerability that could be exploited by a third-party to steal personal information.

Apple releases OS X, iOS, Safari updates

By

Apple on Wednesday issued much-anticipated updates for its Mac OS X and iOS mobile operating system, adding support for its new iCloud service, and fixing a bevy of security flaws.

HTC confirms hole in its Android phones

By

HTC plans to release a patch after a "short" testing period, the company said Tuesday.

HTC investigating flaw in its Android phones

By

A new mobile phone bug stems from an insecure program, called HTCLoggers.apk, which was recently added to some HTC Android devices.

FTC settles with SMS marketer over spam allegations

By

A California man is barred from delivering unsolicited text messages after he sent "a mind-boggling" amount for many months, under a settlement with the Federal Trade Commission.

Video: The "Bring Your Own Device" conundrum

By

SC Magazine Executive Editor Dan Kaplan sits down with a Juniper security executive to learn why the trend of mobility and data migration should be a top concern for security professionals, and how they can institute best practices to deal with the new risk.

Apple delivers iOS patch for jailbreak flaw

By

Apple on Friday issued an update for its iOS mobile operating system, addressing a security flaw being used to jailbreak iPad, iPhone and iPod Touch devices.

Smartphones? There's malware for that, too.

Smartphones? There's malware for that, too.

Mobile devices, while unique, pose security challenges not unlike traditional PCs, and organizations can apply some basic tips to stay ahead of the threats.

Colorado agency loses medical aid applicants' data

By

A computer disk containing the personal information of thousands of medical aid applications has gone missing from the Colorado Department of Health Care Policy and Financing.

Risky mobile behaviors routine in business

By

A survey of more than 1,500 individuals from 14 countries found that half of device users keep passwords, PIN codes or credit card details on their mobile devices.

Google fixing Android Wi-Fi snooping flaw

By

Google on Wednesday began distributing a patch to address a security flaw in all but the latest versions of its Android mobile operating system.

Apple issues iOS update to cool off tracking issue

By

Apple this week issued an update to address rampant concerns that its iPhone and iPad devices are collecting and storing information about users' locations.

Mobile device control: Get to yes

Mobile device control: Get to yes

If you aren't already trying to figure out your mobile device security strategy, you soon will be, says Vicky Ames, former information system security officer at a federal medical research agency.

Apple responds to data collection concerns

By

Apple has denied logging users' locations and promised to release a software update to change the way it stores data on iPhones.

Google remotely killing Android malware

By

Google is now using a remote security tool to remove malicious applications from affected Android devices after a malware outbreak hit its official app store.

Mobile security offerings useful despite lack of malware

Mobile security offerings useful despite lack of malware

Until mobile malware becomes more pervasive, the current lot of smartphone security offerings can help users with other concerns.

RSA Conference 2011: Smartphone threats imminent, security lacking

By

Most users are not aware of the risks in smartphones and the security industry is struggling to develop tools to defend these devices, a panel of experts said on Wednesday at RSA Conference in San Francisco.

Smart mobile app development

Smart mobile app development

Mobile threats will soon be used to gain access to personal and business devices, says Sean Martin.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US