Mobile Security

Industry groups issue web, mobile messaging best practices

By

Best practices for mobile devices highlighted rising threats in a market where BYOD has become standard.

Plan BYOD with the workers

Plan BYOD with the workers

Most BYOD discussions focus on technical issues, such as how to identify offending devices, how to keep them off the network, or how to limit the types of devices. But nobody is talking about the human element.

Authenticating new tech: Safeguarding mobile identities

Authenticating new tech: Safeguarding mobile identities

In the age of mobile, social and cloud, the so-called perimeter that businesses have been protecting for years is now dead.

Samsung fixed reset flaw in Galaxy S3, other updates pending

By

The vulnerability, which affects various Galaxy models, could allow an attacker to initiate a factory reset on phones, remotely wiping them, if they are able to trick a victim into visiting a malicious web page.

MDM and BYOD: A square peg for a round hole

MDM and BYOD: A square peg for a round hole

While mobile device management will always be in use in the enterprise, thankfully, a better option exists.

Video: Protecting enterprise mobility through app management

By

With a slew of threat vectors to cover, security professionals are faced with one of the biggest challenges in the industry to date: mobility in the workplace. In this video, the founder and president of Appthority discusses app management in the enterprise.

LinkedIn confirms that posted passwords are of its members

By

Business-networking site LinkedIn is looking into the possibility of a data breach which may have led to the theft of nearly 6.5 million user passwords.

Apple goes public with iOS security features

Apple goes public with iOS security features

By

Apple is known to be secretive when it comes to sharing information on its engineering, but a new guide on iOS security released this week by the computing giant could change the game.

How mobile security breeds concern for companies

How mobile security breeds concern for companies

By

Mobile security problems continue to vex many an IT security officer.

SC Congress Canada: Policies can combat mobile worries

By

Experts at this year's SC Congress Canada in Toronto discussed the challenges of BYOD and how implementing policies may be the industry's biggest weapon.

Tightening the fed's belt: Government Roundtable

Tightening the fed's belt: Government Roundtable

By

At a recent SC Magazine Roundtable, gov't security pros bemoaned the difficulty in obtaining resources. But instead of crying over spilled milk, they traded ideas for mitigating risk in a down economy.

Shutting access to passwords

Shutting access to passwords

Imagine a mobile device falling into the wrong hands - resulting in the draining of bank accounts co-opting of identities.

Malicious software meets BYOD

Malicious software meets BYOD

Bringing together two separate pieces of security research reveals vulnerability to cybercrime on an alarming scale.

IBM X-Force reports that mobile threats are increasing

By

While progress against security threats has been made, attackers are targeting new vulnerabilities, such as those found in mobile devices, according to the annual IBM X-Force study.

The state of BYOD

The state of BYOD

Enterprises are being exposed to multiple operating systems, models and operators - requiring IT teams to support the safe deployment of personal devices used for work purposes.

Video: Mobile and social networking threats

By

From issues that corporations face with mobile security, to social networking threats on sites like Pinterest, there were endless hot topics at this year's RSA Conference 2012 in San Francisco.

Apple pushes security update for iPhone, iPad

By

Apple on Wednesday updated its iOS mobile operating system to rectify more than 80 vulnerabilities.

The blueprint for secure BYOD

Bring-your-own-device (BYOD) quickly made the jump from industry trend to business imperative, and organizations are now feeling the pressure to open their networks to employee-owned devices.

Google Wallets app flaw could lead to compromise

By

Google has temporarily disabled the creation of prepaid payment cards while it investigates two security flaws in Google Wallet accounts on Android phones.

Enterprise app stores can reduce mobile security threat

Enterprise app stores can reduce mobile security threat

With BYOD, there's a confluence of people bringing in potential dangers from the outside that in turn presents a new class of security concerns that businesses haven't had to consider before.

Going mobile: Bedford Industries and GroupLogic

Going mobile: Bedford Industries and GroupLogic

By

A manufacturing company with a number of employees on the road found a tool to enable the secure sharing of documents, reports Greg Masters.

Android users share their "rage" for free Windows Phone

By

Android users have taken to Twitter to air their grievances about their phones, prompted by an unusual offer from a Microsoft employee

Office mobility: Consumerization of devices

Office mobility: Consumerization of devices

No longer with the option of saying "no" to its employees, organizations are finding that solutions and techniques exist for managing and securing the mobile devices workers wish to connect to the corporate network.

HTC working with carriers to push Android bug fix

By

Users of HTC-made Android devices are receiving software security updates to correct a vulnerability that could be exploited by a third-party to steal personal information.

Who's listening to your conference calls?

Who's listening to your conference calls?

While phone conference lines vary, they don't provide for a lot of security.

Lawmaker urges Sprint, T-Moble to bolster voicemail security

By

U.S. Senator Barbara Boxer is urging telecommunications companies Sprint and T-Mobile to improve voicemail security in light of the ongoing U.K. scandal accusing Rupert Murdoch's media empire of phone hacking.

Border patrol: Perimeter defense

Border patrol: Perimeter defense

By

The perimeter is a distant memory of what it once was, considering the influx of third-party workers combined with new technologies, such as cloud and mobile. But it still needs safeguarding.

Look - my Android is being robbed!

New attack on the Android OS take place in broad daylight, following the installation of increasingly popular malicious apps.

FBI probes possible Murdoch phone hacking in U.S.

By

A security and privacy expert explains how cracking voicemails takes little skill.

Zeus for Android steals one-time banking passwords

By

Researchers have discovered a new variant of the insidious Zeus trojan designed to run on Google Android smartphones, but the threat is minimal in the United States.

Sign up to our newsletters

POLL