Best practices for mobile devices highlighted rising threats in a market where BYOD has become standard.
Most BYOD discussions focus on technical issues, such as how to identify offending devices, how to keep them off the network, or how to limit the types of devices. But nobody is talking about the human element.
In the age of mobile, social and cloud, the so-called perimeter that businesses have been protecting for years is now dead.
The vulnerability, which affects various Galaxy models, could allow an attacker to initiate a factory reset on phones, remotely wiping them, if they are able to trick a victim into visiting a malicious web page.
With a slew of threat vectors to cover, security professionals are faced with one of the biggest challenges in the industry to date: mobility in the workplace. In this video, the founder and president of Appthority discusses app management in the enterprise.
Business-networking site LinkedIn is looking into the possibility of a data breach which may have led to the theft of nearly 6.5 million user passwords.
Apple is known to be secretive when it comes to sharing information on its engineering, but a new guide on iOS security released this week by the computing giant could change the game.
Mobile security problems continue to vex many an IT security officer.
Experts at this year's SC Congress Canada in Toronto discussed the challenges of BYOD and how implementing policies may be the industry's biggest weapon.
At a recent SC Magazine Roundtable, gov't security pros bemoaned the difficulty in obtaining resources. But instead of crying over spilled milk, they traded ideas for mitigating risk in a down economy.
Imagine a mobile device falling into the wrong hands - resulting in the draining of bank accounts co-opting of identities.
Bringing together two separate pieces of security research reveals vulnerability to cybercrime on an alarming scale.
While progress against security threats has been made, attackers are targeting new vulnerabilities, such as those found in mobile devices, according to the annual IBM X-Force study.
Enterprises are being exposed to multiple operating systems, models and operators - requiring IT teams to support the safe deployment of personal devices used for work purposes.
From issues that corporations face with mobile security, to social networking threats on sites like Pinterest, there were endless hot topics at this year's RSA Conference 2012 in San Francisco.
Apple on Wednesday updated its iOS mobile operating system to rectify more than 80 vulnerabilities.
Bring-your-own-device (BYOD) quickly made the jump from industry trend to business imperative, and organizations are now feeling the pressure to open their networks to employee-owned devices.
Google has temporarily disabled the creation of prepaid payment cards while it investigates two security flaws in Google Wallet accounts on Android phones.
With BYOD, there's a confluence of people bringing in potential dangers from the outside that in turn presents a new class of security concerns that businesses haven't had to consider before.
A manufacturing company with a number of employees on the road found a tool to enable the secure sharing of documents, reports Greg Masters.
Android users have taken to Twitter to air their grievances about their phones, prompted by an unusual offer from a Microsoft employee
No longer with the option of saying "no" to its employees, organizations are finding that solutions and techniques exist for managing and securing the mobile devices workers wish to connect to the corporate network.
Users of HTC-made Android devices are receiving software security updates to correct a vulnerability that could be exploited by a third-party to steal personal information.
While phone conference lines vary, they don't provide for a lot of security.
U.S. Senator Barbara Boxer is urging telecommunications companies Sprint and T-Mobile to improve voicemail security in light of the ongoing U.K. scandal accusing Rupert Murdoch's media empire of phone hacking.
The perimeter is a distant memory of what it once was, considering the influx of third-party workers combined with new technologies, such as cloud and mobile. But it still needs safeguarding.
New attack on the Android OS take place in broad daylight, following the installation of increasingly popular malicious apps.
A security and privacy expert explains how cracking voicemails takes little skill.
Researchers have discovered a new variant of the insidious Zeus trojan designed to run on Google Android smartphones, but the threat is minimal in the United States.
Federal lawmakers last week proposed two separate bills that would regulate the collection and use of location data from smartphones and other mobile devices. The Location Privacy Protection Act of 2011, introduced Friday by Sens. Al Franken, D-Minn. and Richard Blumenthal, D-Conn., would require companies to obtain permission before collecting mobile users' location data and sharing it with third parties. The bill is similar to the Geolocation Privacy and Surveillance Act, introduced Wednesday to create guidelines for when and how geolocation information can be accessed and used by government agencies, commercial entities and private citizens. The bills were born out of controversial revelations in April that Apple was storing user's location data.