Mobile Security

Five great reasons to embrace mobile in the enterprise

Mobile Devices has seen unprecedented growth since their introduction and now form an integral part of our daily lives. Yet, many Enterprises have not fully embraced mobile as part of their strategy because of too many unanswered questions.

DroidJack RAT hits hacker forums, comes from legitimate app developers

By

A researcher at Symantec traced DroidJack's origins back to legitimate Android app developers and previous RATs.

'DoubleDirect' MitM attack affects iOS, Android and OS X users

'DoubleDirect' MitM attack affects iOS, Android and OS X users

By

Security firm Zimperium detected attacks in the wild over the past six to eight months.

Android malware 'NotCompatible' evolves, spawns resilient botnet

Android malware 'NotCompatible' evolves, spawns resilient botnet

By

Mobile security firm Lookout detailed how the malware has grown in complexity to hide its botnet activity.

Mobile madness

More and more corporate activities are being undertaken by employees depending on iPhones, iPads, laptops and other mobile devices.

U.S. spy program targeting Americans' mobile phones, report says

U.S. spy program targeting Americans' mobile phones, report says

By

The U.S. Department of Justice is attaching small devices to airplanes that gather massive amounts of mobile phone data, including the data of innocent Americans, a Wall Street Journal report indicates.

Mobile fraud report notes reliance on OTPs as top concern

Mobile fraud report notes reliance on OTPs as top concern

By

One-time passwords (OTPs) sent via SMS are increasingly the target of Android malware, the report by Javelin revealed.

Amex debuts token service

Amex debuts token service

By

American Express Token Service is based on a technical framework developed by EMVCo.

Your data's gone mobile: Keep it secure

There now are more mobile devices on the planet than humans, and cyber criminals are targeting them at an increasing rate.

Google open sources network traffic security testing tool

By

The tool, called "notogotofail," tests whether devices and applications are secured against known TLS/SSL flaws and misconfigurations.

Hackers are after your app

Hackers are after your app

Modern mobile hacks are diverse and can be performed by anyone, from an inexperienced amateur to highly skilled teams operating like tech startups.

A balancing act: Apple technology

A balancing act: Apple technology

Apple's iPhone 6 and iOS 8 offer encryption for mobile users, but a focus on consumers can create security conundrums, reports Lee Sustar.

Network care: Case study

Network care: Case study

By

When a care provider supplied laptops to its roving employees, it added a security solution to enable efficient collaboration. Greg Masters reports.

Safe tether: Wearables

Safe tether: Wearables

By

Wearable devices efficiently monitor user activity, but also open new targets for malware authors, reports Alan Earls.

Will cyber threaten mobile?

Will cyber threaten mobile?

As mobile devices are further integrated into networks, organizations will have a critical need to implement end-to-end security solutions.

Worm variant of Android ransomware, Koler, spreads via SMS

Worm variant of Android ransomware, Koler, spreads via SMS

By

Upon infection, the Koler variant will send an SMS message to all contacts in the device's address book.

Virtualization advancements focus on protecting data at the source, not on the device

Virtualization advancements focus on protecting data at the source, not on the device

As malware doubles on mobile devices and mobility poses a greater risk, virtualization is about protecting data at the source rather than on the device.

Security in the new mobile ecosystem

A recent study, conducted by the Ponemon Institute, and commissioned by Raytheon, has revealed some interesting facts related to the adoption and barriers to mobile device usage in the workplace.

New mobile trojan masquerading as Tic-tac-toe game targets Android devices

New mobile trojan masquerading as Tic-tac-toe game targets Android devices

By

A Tic-tac-toe game is actually a new mobile trojan being used to steal data and spy on Android devices.

AT&T to pay $150M to settle cramming case, covers $80M in refunds

AT&T to pay $150M to settle cramming case, covers $80M in refunds

By

The settlement marks the largest FCC enforcement action to date, and also involved the FTC and state attorneys general.

Marriott to pay $600K fine for blocking guests' Wi-Fi networks

By

The FCC launched an investigation last year after a consumer complained of the practice.

Chinese iOS trojan targets jailbroken devices

By

The trojan is known as Xsser mRAT is targeting protesters in China, but devices have to be jailbroken in order to be infected.

Pakistani man indicted over spyware app creation

By

Hammad Akbar created StealthGenie, which allowed the purchaser to secretly monitor a cell phone's communications.

Driven by mobile: The challenge of protecting mobile devices

Driven by mobile: The challenge of protecting mobile devices

By

Hardware makers and solutions providers seek to find the right formula for protecting devices - and data, reports Alan Earls.

Passwords are passé

Passwords are passé

By

New solutions are gaining traction to complement, or replace, the legacy use of username and password, reports Ashley Carman.

Embracing BYOD...with safeguards

Embracing BYOD...with safeguards

It's possible to safely manage the security risks posed by BYOD, says Anders Lofgren at Acronis Access.

Apple releases iOS 8.0.2 to quell buggy update complaints

Apple releases iOS 8.0.2 to quell buggy update complaints

By

The update comes soon after the company released iOS 8.0.1, which caused issues for iPhone 6 and iPhone 6 Plus users.

FBI director criticizes Apple, Google encryption moves

By

James Comey reportedly said the developments could put consumers "beyond the law."

Apple pulls iOS 8.0.1 after TouchID, cell service complaints

By

The update was issued only a week ago, and has now been yanked by the tech giant.

Researcher hacks iPhone 6 Touch ID sensor

By

Little progress was made security wise, between the iPhone 5S and iPhone 6 sensor, a researcher found.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US