Mobile Security

Mobile madness

More and more corporate activities are being undertaken by employees depending on iPhones, iPads, laptops and other mobile devices.

Your data's gone mobile: Keep it secure

There now are more mobile devices on the planet than humans, and cyber criminals are targeting them at an increasing rate.

Worm variant of Android ransomware, Koler, spreads via SMS

Worm variant of Android ransomware, Koler, spreads via SMS

By

Upon infection, the Koler variant will send an SMS message to all contacts in the device's address book.

Virtualization advancements focus on protecting data at the source, not on the device

Virtualization advancements focus on protecting data at the source, not on the device

As malware doubles on mobile devices and mobility poses a greater risk, virtualization is about protecting data at the source rather than on the device.

Security in the new mobile ecosystem

A recent study, conducted by the Ponemon Institute, and commissioned by Raytheon, has revealed some interesting facts related to the adoption and barriers to mobile device usage in the workplace.

New mobile trojan masquerading as Tic-tac-toe game targets Android devices

New mobile trojan masquerading as Tic-tac-toe game targets Android devices

By

A Tic-tac-toe game is actually a new mobile trojan being used to steal data and spy on Android devices.

AT&T to pay $150M to settle cramming case, covers $80M in refunds

AT&T to pay $150M to settle cramming case, covers $80M in refunds

By

The settlement marks the largest FCC enforcement action to date, and also involved the FTC and state attorneys general.

Marriott to pay $600K fine for blocking guests' Wi-Fi networks

By

The FCC launched an investigation last year after a consumer complained of the practice.

Chinese iOS trojan targets jailbroken devices

By

The trojan is known as Xsser mRAT is targeting protesters in China, but devices have to be jailbroken in order to be infected.

Pakistani man indicted over spyware app creation

By

Hammad Akbar created StealthGenie, which allowed the purchaser to secretly monitor a cell phone's communications.

Driven by mobile: The challenge of protecting mobile devices

Driven by mobile: The challenge of protecting mobile devices

By

Hardware makers and solutions providers seek to find the right formula for protecting devices - and data, reports Alan Earls.

Passwords are passé

Passwords are passé

By

New solutions are gaining traction to complement, or replace, the legacy use of username and password, reports Ashley Carman.

Embracing BYOD...with safeguards

Embracing BYOD...with safeguards

It's possible to safely manage the security risks posed by BYOD, says Anders Lofgren at Acronis Access.

Apple releases iOS 8.0.2 to quell buggy update complaints

Apple releases iOS 8.0.2 to quell buggy update complaints

By

The update comes soon after the company released iOS 8.0.1, which caused issues for iPhone 6 and iPhone 6 Plus users.

FBI director criticizes Apple, Google encryption moves

By

James Comey reportedly said the developments could put consumers "beyond the law."

Apple pulls iOS 8.0.1 after TouchID, cell service complaints

By

The update was issued only a week ago, and has now been yanked by the tech giant.

Researcher hacks iPhone 6 Touch ID sensor

By

Little progress was made security wise, between the iPhone 5S and iPhone 6 sensor, a researcher found.

Mobile device security sacrificed for productivity, study says

Mobile device security sacrificed for productivity, study says

By

A Ponemon Institute study, sponsored by Raytheon, revealed that employees increasingly use mobile devices for work but cut corners and circumvent security.

Google to encrypt data by default on Android L devices

By

The mobile operating system, Android L, is expected to be released later this year.

Gartner: 75 percent of mobile apps will fail security tests through end of 2015

Gartner: 75 percent of mobile apps will fail security tests through end of 2015

By

As BYOD and mobile computing become more critical to business, app downloads will raise security risks.

Windseeker app spies on chats using injection, hooking techniques

Windseeker app spies on chats using injection, hooking techniques

By

The Android app targets Chinese users, but its malicious techniques could become more widespread in the mobile arena, a security firm warns.

Apple implements two-factor authentication

By

The company followed through on its promise to up iCloud security by implementing two-factor authentication earlier this week.

Yelp and TinyCo settle with FTC over COPPA Rule violations

Yelp and TinyCo settle with FTC over COPPA Rule violations

By

Yelp will pay $450,000, and TinyCo will pay $300,000 to settle charges that their mobile apps collected information from children under the age of 13.

Android bug allowing SOP bypass a 'privacy disaster,' researcher warns

Android bug allowing SOP bypass a 'privacy disaster,' researcher warns

By

Google reportedly addressed the issue, but many users likely await the fix from providers or OEMs.

Researchers in China work on facial recognition payment app

By

The app is expected to be launched next year.

Mobile app study reveals privacy concerns

Mobile app study reveals privacy concerns

By

Of the more than 1,200 mobile apps that were assessed in a recent study, 75 percent requested one or more permissions.

Building a trustworthy mobility program

Building a trustworthy mobility program

As device adoption continues to grow, the importance of implementing a secure enterprise mobility program cannot be understated.

Industry groups issue web, mobile messaging best practices

By

Best practices for mobile devices highlighted rising threats in a market where BYOD has become standard.

SC Congress NY: To cut BYOD security costs, get specific

By

Security experts at SC Congress New York said that well-defined user guidelines set the stage for more efficient, less costly BYOD

Is danger looming: Mobile vulnerabilities

Is danger looming: Mobile vulnerabilities

With users flocking toward mobile platforms, fraudsters will join as well. But businesses have a bigger problem: What to do about employees wanting to use their devices to connect to the corporate network.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US