Mobile Security

Mobile device security sacrificed for productivity, study says

Mobile device security sacrificed for productivity, study says

By

A Ponemon Institute study, sponsored by Raytheon, revealed that employees increasingly use mobile devices for work but cut corners and circumvent security.

Google to encrypt data by default on Android L devices

By

The mobile operating system, Android L, is expected to be released later this year.

Gartner: 75 percent of mobile apps will fail security tests through end of 2015

Gartner: 75 percent of mobile apps will fail security tests through end of 2015

By

As BYOD and mobile computing become more critical to business, app downloads will raise security risks.

Windseeker app spies on chats using injection, hooking techniques

Windseeker app spies on chats using injection, hooking techniques

By

The Android app targets Chinese users, but its malicious techniques could become more widespread in the mobile arena, a security firm warns.

Apple implements two-factor authentication

By

The company followed through on its promise to up iCloud security by implementing two-factor authentication earlier this week.

Yelp and TinyCo settle with FTC over COPPA Rule violations

Yelp and TinyCo settle with FTC over COPPA Rule violations

By

Yelp will pay $450,000, and TinyCo will pay $300,000 to settle charges that their mobile apps collected information from children under the age of 13.

Android bug allowing SOP bypass a 'privacy disaster,' researcher warns

Android bug allowing SOP bypass a 'privacy disaster,' researcher warns

By

Google reportedly addressed the issue, but many users likely await the fix from providers or OEMs.

Researchers in China work on facial recognition payment app

By

The app is expected to be launched next year.

Mobile app study reveals privacy concerns

Mobile app study reveals privacy concerns

By

Of the more than 1,200 mobile apps that were assessed in a recent study, 75 percent requested one or more permissions.

Building a trustworthy mobility program

Building a trustworthy mobility program

As device adoption continues to grow, the importance of implementing a secure enterprise mobility program cannot be understated.

Industry groups issue web, mobile messaging best practices

By

Best practices for mobile devices highlighted rising threats in a market where BYOD has become standard.

SC Congress NY: To cut BYOD security costs, get specific

By

Security experts at SC Congress New York said that well-defined user guidelines set the stage for more efficient, less costly BYOD

Is danger looming: Mobile vulnerabilities

Is danger looming: Mobile vulnerabilities

With users flocking toward mobile platforms, fraudsters will join as well. But businesses have a bigger problem: What to do about employees wanting to use their devices to connect to the corporate network.

Plan BYOD with the workers

Plan BYOD with the workers

Most BYOD discussions focus on technical issues, such as how to identify offending devices, how to keep them off the network, or how to limit the types of devices. But nobody is talking about the human element.

Authenticating new tech: Safeguarding mobile identities

Authenticating new tech: Safeguarding mobile identities

In the age of mobile, social and cloud, the so-called perimeter that businesses have been protecting for years is now dead.

Samsung fixed reset flaw in Galaxy S3, other updates pending

By

The vulnerability, which affects various Galaxy models, could allow an attacker to initiate a factory reset on phones, remotely wiping them, if they are able to trick a victim into visiting a malicious web page.

MDM and BYOD: A square peg for a round hole

MDM and BYOD: A square peg for a round hole

While mobile device management will always be in use in the enterprise, thankfully, a better option exists.

PCI issues guidelines for payment security in mobile apps

By

The PCI Security Standards Council, which provides payment security standards for merchants which accept credit cards, recently introduced new guidelines for mobile app developers and device manufacturers.

Making peace with the cloud and BYOD

Making peace with the cloud and BYOD

If there are two trends that have created a multitude of issues for security professionals, they're cloud services and bring-your-own-device. But there are ways to manage them.

Assurance on the shore

Assurance on the shore

By

While the town of Brick on the New Jersey shore maintains a 1950s aura, with the growth of digital media, its public school system had to alleviate engorged traffic on its network, while safeguarding data.

Black Hat: Researchers find way to "bounce" malware into Google app store

A team of security enthusiasts at Trustwave developed a trick that allowed them to create a malicious mobile application that avoided detection by Google's new Bouncer malware scanner.

Don't fear BYOD, embrace it and monitor it

Don't fear BYOD, embrace it and monitor it

As security professionals try and grapple with one of the biggest challenges in the industry, the key to embracing a bring-your-own-device (BYOD) environment is clear visibility.

Video: Protecting enterprise mobility through app management

By

With a slew of threat vectors to cover, security professionals are faced with one of the biggest challenges in the industry to date: mobility in the workplace. In this video, the founder and president of Appthority discusses app management in the enterprise.

LinkedIn confirms that posted passwords are of its members

By

Business-networking site LinkedIn is looking into the possibility of a data breach which may have led to the theft of nearly 6.5 million user passwords.

Apple goes public with iOS security features

Apple goes public with iOS security features

By

Apple is known to be secretive when it comes to sharing information on its engineering, but a new guide on iOS security released this week by the computing giant could change the game.

How mobile security breeds concern for companies

How mobile security breeds concern for companies

By

Mobile security problems continue to vex many an IT security officer.

Report finds 1,200 percent boom in Android malware

Report finds 1,200 percent boom in Android malware

By

The latest McAfee Threats Report revealed that the amount of Android malware still is soaring.

SC Congress Canada: Policies can combat mobile worries

By

Experts at this year's SC Congress Canada in Toronto discussed the challenges of BYOD and how implementing policies may be the industry's biggest weapon.

Bridging corporate and personal

Bridging corporate and personal

There is increasing pressure to make corporate resources available to users on any device.

Exotic, new connections: Embedded devices

Exotic, new connections: Embedded devices

For a while, only traditional PCs were connected to the public internet. But with most devices now gaining networked capabilities, it's only a matter of time before your television can contract a virus.

Sign up to our newsletters

POLL