Mobile Security

Is the password dead? Not just yet.

Mark Twain once said, "The report of my death was an exaggeration." Can the same be said for the password?

Checkmarx receives $84M investment

By

Application security firm Checkmarx announced on Thursday it received an $84M investment from Insight Venture Partners.

Samsung devices, including Galaxy S6, vulnerable to remote code execution

Samsung devices, including Galaxy S6, vulnerable to remote code execution

By

NowSecure detailed a vulnerability in Samsung's pre-installed Swift keyboard app that leaves device owners vulnerable to remote code execution.

Moving beyond passwords with mobile

Digital Identity is the foundation for granting user access in today's connected enterprise. Dated authentication approaches fall short on both security effectiveness and user experience.

SC Congress Toronto: IBM's Lodewijkx shares company's guiding security principles

SC Congress Toronto: IBM's Lodewijkx shares company's guiding security principles

By

During the afternoon keynote at SC Congress Toronto, Lodewijkx shared IBM's guiding principles for mitigating IT security threats.

Apple to require iOS 9 users to use six-digit passwords and two-step authentication

By

Apple will require iOS 9 users to use six-digit passwords and two-factor authentication when signing into Apple services from a new device or browser.

The long and winding road: EMV adoption

The long and winding road: EMV adoption

By

Swapping out magnetic stripe payment cards for those equipped with computer chips is no small task, reports Karen Epper Hoffman.

iOS text message bug a nuisance, could have broader security implications

iOS text message bug a nuisance, could have broader security implications

By

An iOS 8 bug in the Messages app causes iPhones to crash and reboot after receiving a specific string of Arabic characters.

Help protect your organization from visual hacking: Best practices

How serious is the risk of visual hacking in your organization? Consider who may be viewing, photographing and collecting sensitive information from your offices and electronic devices when staff is mobile.

More than 30 scareware apps disguised as Minecraft cheats in Google Play

By

More than 30 apps in the Google Play store were found to be scareware posing as Minecraft cheats.

U.S. authorities investigate fraudulent Uber charges to British accounts

By

U.S. authorities are investigating claims by British Uber customers that they were charged for phantom rides in the U.S.

Extortion malware for Android, iOS rose in second half of 2014, report says

By

F-Secure observed an uptick in ransomware as well as malware for both Android and iOS in the second half of last year, according to its new threat report.

Survey highlights millennial, baby boomer habits on corporate devices

By

Sixty-four percent of millennials used their employer-owned device for personal use, compared to 37 percent of baby boomers.

Verizon Wireless, Sprint in $158M settlement with FCC over cramming

By

The Federal Communications Commission (FCC) said Verizon Wireless and Sprint would pay $90 million and $68 million respectively for billing customers for unauthorized third-party texting services charges.

Hackers exploit Starbucks auto-reload feature to steal from customers

Hackers exploit Starbucks auto-reload feature to steal from customers

By

Starbucks customers say auto-reload feature is being used to steal from their linked credit cards and bank accounts.

Mobile threats on the rise, Q1 2015 report shows

Mobile threats on the rise, Q1 2015 report shows

By

Kaspersky Lab saw 3.3 times as many new malicious mobile programs in Q1 2015 than it did in the final quarter of last year.

Koler ransomware variant targets Android users in Canada

Koler ransomware variant targets Android users in Canada

By

The threat actors set up malicious adult websites to distribute the malware, and so far infection rates are estimated to be in the thousands.

Internet security best practices from the Global 1000

The world of IT security is undergoing tremendous change. The unstoppable momentum of the Internet and cloud computing, the ubiquity of mobile devices and the emergence of Internet of things have together turned the IT security landscape upside down.

iPad app glitch delays 74 flights for American Airlines

By

A glitch in an iPad apps pilots use to communicate caused of 74 flight delays for American Airlines.

Forrester estimates that broad EMV chip adoption is half a decade away

Forrester estimates that broad EMV chip adoption is half a decade away

By

EMV, despite its security features over magnetic stripe cards, cannot prevent against "wholesale breaches of large numbers of credit card numbers," report authors said.

Mobile apps riddled with security flaws

By

Andrew Hogg, CEO of Now Source, explains how some of the most popular applications can be riddled with security flaws.

RSA 2015: 'No iOS Zone' attack allows denial-of-service against Apple devices

RSA 2015: 'No iOS Zone' attack allows denial-of-service against Apple devices

By

According to the co-founders of Skycure, which presented on the attack at RSA Conference, Apple has not completely resolved the security issue.

RSA 2015: Contactless payment systems have weaknesses

RSA 2015: Contactless payment systems have weaknesses

By

Contactless payment systems such as EMV cards and Apple Pay are convenient, but are not without weaknesses.

Report: DEA contract supplied agency with Hacking Team spyware

By

Motherboard and Privacy International revealed the contract between DEA and a government supplier.

Today's mobile security threats and tips to enable productivity without compromising data security

The threat landscape is evolving, and mobile threats are on the rise.

Cross-platform RAT 'AlienSpy' targets Mac OS X, Windows and Android users

Cross-platform RAT 'AlienSpy' targets Mac OS X, Windows and Android users

By

The AlienSpy remote access trojan (RAT) is being sold to attackers via subscription plans, ranging from around $20 to $220.

36 percent in survey don't think its necessary to back up data

By

An Avast global survey measuring data preservation habits found that despite not backing up regularly users are concerned with the data in their devices.

Google: Android PHA installs decreased by nearly 50 percent throughout 2014

Google: Android PHA installs decreased by nearly 50 percent throughout 2014

By

The rate of Potentially Harmful Application installs on Android devices decreased nearly 50 percent from early 2014 to later that year, according to a Google report.

Avoid a network stampede

Avoid a network stampede

The rise of IoT will require a completely new approach to network security, says vArmour CEO Timothy Eades.

Debate: Your money is safe online.

Debate: Your money is safe online.

Given the recent headline-grabbing breaches, in this month's debate information security professionals discuss whether or not money is safe online.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US