A Ponemon Institute study, sponsored by Raytheon, revealed that employees increasingly use mobile devices for work but cut corners and circumvent security.
The mobile operating system, Android L, is expected to be released later this year.
As BYOD and mobile computing become more critical to business, app downloads will raise security risks.
The Android app targets Chinese users, but its malicious techniques could become more widespread in the mobile arena, a security firm warns.
The company followed through on its promise to up iCloud security by implementing two-factor authentication earlier this week.
Yelp will pay $450,000, and TinyCo will pay $300,000 to settle charges that their mobile apps collected information from children under the age of 13.
Google reportedly addressed the issue, but many users likely await the fix from providers or OEMs.
The app is expected to be launched next year.
Of the more than 1,200 mobile apps that were assessed in a recent study, 75 percent requested one or more permissions.
As device adoption continues to grow, the importance of implementing a secure enterprise mobility program cannot be understated.
Best practices for mobile devices highlighted rising threats in a market where BYOD has become standard.
Security experts at SC Congress New York said that well-defined user guidelines set the stage for more efficient, less costly BYOD
With users flocking toward mobile platforms, fraudsters will join as well. But businesses have a bigger problem: What to do about employees wanting to use their devices to connect to the corporate network.
Most BYOD discussions focus on technical issues, such as how to identify offending devices, how to keep them off the network, or how to limit the types of devices. But nobody is talking about the human element.
In the age of mobile, social and cloud, the so-called perimeter that businesses have been protecting for years is now dead.
The vulnerability, which affects various Galaxy models, could allow an attacker to initiate a factory reset on phones, remotely wiping them, if they are able to trick a victim into visiting a malicious web page.
While mobile device management will always be in use in the enterprise, thankfully, a better option exists.
The PCI Security Standards Council, which provides payment security standards for merchants which accept credit cards, recently introduced new guidelines for mobile app developers and device manufacturers.
If there are two trends that have created a multitude of issues for security professionals, they're cloud services and bring-your-own-device. But there are ways to manage them.
While the town of Brick on the New Jersey shore maintains a 1950s aura, with the growth of digital media, its public school system had to alleviate engorged traffic on its network, while safeguarding data.
A team of security enthusiasts at Trustwave developed a trick that allowed them to create a malicious mobile application that avoided detection by Google's new Bouncer malware scanner.
As security professionals try and grapple with one of the biggest challenges in the industry, the key to embracing a bring-your-own-device (BYOD) environment is clear visibility.
With a slew of threat vectors to cover, security professionals are faced with one of the biggest challenges in the industry to date: mobility in the workplace. In this video, the founder and president of Appthority discusses app management in the enterprise.
Business-networking site LinkedIn is looking into the possibility of a data breach which may have led to the theft of nearly 6.5 million user passwords.
Apple is known to be secretive when it comes to sharing information on its engineering, but a new guide on iOS security released this week by the computing giant could change the game.
Mobile security problems continue to vex many an IT security officer.
The latest McAfee Threats Report revealed that the amount of Android malware still is soaring.
Experts at this year's SC Congress Canada in Toronto discussed the challenges of BYOD and how implementing policies may be the industry's biggest weapon.
There is increasing pressure to make corporate resources available to users on any device.
For a while, only traditional PCs were connected to the public internet. But with most devices now gaining networked capabilities, it's only a matter of time before your television can contract a virus.