Mobile Security

Internet security best practices from the Global 1000

The world of IT security is undergoing tremendous change. The unstoppable momentum of the Internet and cloud computing, the ubiquity of mobile devices and the emergence of Internet of things have together turned the IT security landscape upside down.

RSA 2015: 'No iOS Zone' attack allows denial-of-service against Apple devices

RSA 2015: 'No iOS Zone' attack allows denial-of-service against Apple devices

By

According to the co-founders of Skycure, which presented on the attack at RSA Conference, Apple has not completely resolved the security issue.

RSA 2015: Contactless payment systems have weaknesses

RSA 2015: Contactless payment systems have weaknesses

By

Contactless payment systems such as EMV cards and Apple Pay are convenient, but are not without weaknesses.

Report: DEA contract supplied agency with Hacking Team spyware

By

Motherboard and Privacy International revealed the contract between DEA and a government supplier.

Today's mobile security threats and tips to enable productivity without compromising data security

The threat landscape is evolving, and mobile threats are on the rise.

Cross-platform RAT 'AlienSpy' targets Mac OS X, Windows and Android users

Cross-platform RAT 'AlienSpy' targets Mac OS X, Windows and Android users

By

The AlienSpy remote access trojan (RAT) is being sold to attackers via subscription plans, ranging from around $20 to $220.

36 percent in survey don't think its necessary to back up data

By

An Avast global survey measuring data preservation habits found that despite not backing up regularly users are concerned with the data in their devices.

Google: Android PHA installs decreased by nearly 50 percent throughout 2014

Google: Android PHA installs decreased by nearly 50 percent throughout 2014

By

The rate of Potentially Harmful Application installs on Android devices decreased nearly 50 percent from early 2014 to later that year, according to a Google report.

Avoid a network stampede

Avoid a network stampede

The rise of IoT will require a completely new approach to network security, says vArmour CEO Timothy Eades.

Debate: Your money is safe online.

Debate: Your money is safe online.

Given the recent headline-grabbing breaches, in this month's debate information security professionals discuss whether or not money is safe online.

Orgs predict $53M risk, on average, from crypto key, digital cert attacks

Orgs predict $53M risk, on average, from crypto key, digital cert attacks

By

In a Ponemon report, 2,300 security pros provided their two-year outlook on cryptographic key and digital certificate attacks.

Protecting work info ranks low in mobile privacy survey

Protecting work info ranks low in mobile privacy survey

By

In the Lookout survey, only five percent of smartphone users said they would take the most steps to protect work-related data.

Study: Mobile app security risk well-known, but enterprises lack proper usage policy

Study: Mobile app security risk well-known, but enterprises lack proper usage policy

By

Although most IT professionals believe mobile apps in the workplace have increased security risks, less than half of organizations have a policy in place to define acceptable mobile app use.

Rogers victimized by ransomware

By

A misstep by an IT employee of Canadian communications conglomerate Rogers Communications allowed the contractual information of 50-70 of the company's business customers to be exposed via Twitter.

Apps submitted to Google Play are now reviewed by 'experts'

Apps submitted to Google Play are now reviewed by 'experts'

By

Despite Google's new review process, mobile security company Lookout recently identified 13 apps with adware that made it into Google Play.

FireEye scans popular Android and iOS apps, nearly 2K vulnerable to FREAK

By

The SSL/TLS vulnerability FREAK can be exploited to force an HTTPS connection to use weaker and, therefore, easier to crack encryption.

iPad POS security

By

David Bozin, vice president of growth development at Bindo discusses mobile POS considerations, with the help of newer technologies.

Yahoo CISO Alex Stamos tweets 'on-demand' password defense

Yahoo CISO Alex Stamos tweets 'on-demand' password defense

By

Three days after Yahoo announced its new "on-demand" passwords (ODP), the company's CISO Alex Stamos took to Twitter to defend the company's decision and address criticism from the security community.

Yahoo releases e2e encryption source code and launches 'on-demand' passwords

Yahoo releases e2e encryption source code and launches 'on-demand' passwords

By

Yahoo took advantage of South by Southwest's (SXSW) opening weekend this week to make major announcements surrounding its services' security, including the launch of its "on-demand" password service.

Cloud IAM is set to break the sound barrier

Cloud apps and mobile devices are screaming their way into the enterprise like jet fighters, bringing employees more access than ever - and more passwords as well.

Clinton emails uncrypted for 3 months, AP sues State for access

By

Hillary Clinton's emails went unencrypted for the first three months she was secretary of state but have been encrypted since.

Why developers need to think about security

Software developers are challenged with prioritizing between delivering code within aggressive timelines and incorporating security into the development lifecycle.

Serious bug in Dropbox SDK for Android disclosed by IBM

Serious bug in Dropbox SDK for Android disclosed by IBM

By

The flaw could ultimately expose user data, saved to Dropbox through vulnerable third-party apps, to attackers.

2,400 unsafe mobile apps on employee devices in average large enterprise

2,400 unsafe mobile apps on employee devices in average large enterprise

By

Veracode researchers analyzed a pool of about 400,000 applications installed in multiple global enterprises in various industries.

Study: Security pros felt more pressure to secure their organization in 2014 than year prior

Study: Security pros felt more pressure to secure their organization in 2014 than year prior

By

Trustwave polled security professionals on the pressures they felt this past year to keep their enterprise secure.

Top-secret documents indicate researchers attempted to break Apple security measures

By

Researchers associated with the CIA have, for years, conducted tests to break the security of Apple's mobile products, including iPhones and iPads, and have presented their findings at a secret annual meeting.

Xiaomi says Mi 4 smartphone tested for security issues was a fake

Xiaomi says Mi 4 smartphone tested for security issues was a fake

By

Bluebox Security thought it tested a legitimate Xiaomi Mi 4 device, riddled with security issues.

Fraudsters use Apple Pay to purchase goods with stolen cards

By

Credit card data from the Target and Home Depot breaches has been used by attackers to make purchases at Apple stores via the popular Apple Pay system.

Pre-loaded malware found on Xiaomi Mi 4 device, among other issues

By

The smartphone was verified to be a legitimate device by major smartphone distributor Xiaomi.

Clinton's use of private email spawns security, transparency debate

Clinton's use of private email spawns security, transparency debate

By

Hillary Clinton used a private email account during her tenure as secretary of state.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US