Mobile Security

Today's mobile security threats and tips to enable productivity without compromising data security

The threat landscape is evolving, and mobile threats are on the rise.

Orgs predict $53M risk, on average, from crypto key, digital cert attacks

Orgs predict $53M risk, on average, from crypto key, digital cert attacks

By

In a Ponemon report, 2,300 security pros provided their two-year outlook on cryptographic key and digital certificate attacks.

Protecting work info ranks low in mobile privacy survey

Protecting work info ranks low in mobile privacy survey

By

In the Lookout survey, only five percent of smartphone users said they would take the most steps to protect work-related data.

Study: Mobile app security risk well-known, but enterprises lack proper usage policy

Study: Mobile app security risk well-known, but enterprises lack proper usage policy

By

Although most IT professionals believe mobile apps in the workplace have increased security risks, less than half of organizations have a policy in place to define acceptable mobile app use.

Rogers victimized by ransomware

By

A misstep by an IT employee of Canadian communications conglomerate Rogers Communications allowed the contractual information of 50-70 of the company's business customers to be exposed via Twitter.

Apps submitted to Google Play are now reviewed by 'experts'

Apps submitted to Google Play are now reviewed by 'experts'

By

Despite Google's new review process, mobile security company Lookout recently identified 13 apps with adware that made it into Google Play.

FireEye scans popular Android and iOS apps, nearly 2K vulnerable to FREAK

By

The SSL/TLS vulnerability FREAK can be exploited to force an HTTPS connection to use weaker and, therefore, easier to crack encryption.

iPad POS security

By

David Bozin, vice president of growth development at Bindo discusses mobile POS considerations, with the help of newer technologies.

Yahoo CISO Alex Stamos tweets 'on-demand' password defense

Yahoo CISO Alex Stamos tweets 'on-demand' password defense

By

Three days after Yahoo announced its new "on-demand" passwords (ODP), the company's CISO Alex Stamos took to Twitter to defend the company's decision and address criticism from the security community.

Yahoo releases e2e encryption source code and launches 'on-demand' passwords

Yahoo releases e2e encryption source code and launches 'on-demand' passwords

By

Yahoo took advantage of South by Southwest's (SXSW) opening weekend this week to make major announcements surrounding its services' security, including the launch of its "on-demand" password service.

Cloud IAM is set to break the sound barrier

Cloud apps and mobile devices are screaming their way into the enterprise like jet fighters, bringing employees more access than ever - and more passwords as well.

Clinton emails uncrypted for 3 months, AP sues State for access

By

Hillary Clinton's emails went unencrypted for the first three months she was secretary of state but have been encrypted since.

Why developers need to think about security

Software developers are challenged with prioritizing between delivering code within aggressive timelines and incorporating security into the development lifecycle.

Serious bug in Dropbox SDK for Android disclosed by IBM

Serious bug in Dropbox SDK for Android disclosed by IBM

By

The flaw could ultimately expose user data, saved to Dropbox through vulnerable third-party apps, to attackers.

2,400 unsafe mobile apps on employee devices in average large enterprise

2,400 unsafe mobile apps on employee devices in average large enterprise

By

Veracode researchers analyzed a pool of about 400,000 applications installed in multiple global enterprises in various industries.

Study: Security pros felt more pressure to secure their organization in 2014 than year prior

Study: Security pros felt more pressure to secure their organization in 2014 than year prior

By

Trustwave polled security professionals on the pressures they felt this past year to keep their enterprise secure.

Top-secret documents indicate researchers attempted to break Apple security measures

By

Researchers associated with the CIA have, for years, conducted tests to break the security of Apple's mobile products, including iPhones and iPads, and have presented their findings at a secret annual meeting.

Xiaomi says Mi 4 smartphone tested for security issues was a fake

Xiaomi says Mi 4 smartphone tested for security issues was a fake

By

Bluebox Security thought it tested a legitimate Xiaomi Mi 4 device, riddled with security issues.

Fraudsters use Apple Pay to purchase goods with stolen cards

By

Credit card data from the Target and Home Depot breaches has been used by attackers to make purchases at Apple stores via the popular Apple Pay system.

Pre-loaded malware found on Xiaomi Mi 4 device, among other issues

By

The smartphone was verified to be a legitimate device by major smartphone distributor Xiaomi.

Clinton's use of private email spawns security, transparency debate

Clinton's use of private email spawns security, transparency debate

By

Hillary Clinton used a private email account during her tenure as secretary of state.

Android 'Gazon' worm proliferates through texts, infects more than 4k phones

Android 'Gazon' worm proliferates through texts, infects more than 4k phones

By

The worm has gained traction through spam text messages that promise users an Amazon giftcard.

Experts find flaws in Mobile World Congress official app

By

The official Android app of the event contains some flaws that could allow spammers to easily scrape data belonging to conference attendees.

Silent Circle to buy out Geeksphone, fully own Blackphone

By

On the heels of naming a new president and CEO, Silent Circle now assumes 100 percent ownership of Blackphone.

Malware on the move: Mobile malware

Malware on the move: Mobile malware

By

Like virtually all online threats, malware is increasingly finding a ripe new territory on the mobile platform, reports Karen Epper Hoffman.

Gemalto says past intrusions could be related to NSA, GCHQ op

By

Intrusions detected in 2010 and 2011 may be related to surveillance efforts revealed in Snowden leaks, the company said.

Three reasons native mobile apps need extra security love

Three reasons native mobile apps need extra security love

Aside from the many benefits native apps provide, enterprises face challenges they need to deal with to make sure they aren't exposed to the new security risks native apps introduce.

Mobile security in action: How enterprises are getting ahead of threats

Mobile cyber threats are on the rise and getting more advanced. Enterprises want to bolster their security programs to protect against new, unknown mobile threats, but understanding these risks requires visibility.

Florida law enforcement docs show widespread stingray use, secrecy

Florida law enforcement docs show widespread stingray use, secrecy

By

The American Civil Liberties Union (ACLU) has released documents obtained from Florida police and sheriff's departments that reveal Stingray use and raise privacy concerns.

Gemalto investigates claims that gov't spies hacked SIM card encryption keys

Gemalto investigates claims that gov't spies hacked SIM card encryption keys

By

The SIM card maker said it will "devote all resources necessary" to investigate hacking claims revealed in Snowden leaks.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US