Mobile Security

Moving beyond passwords with mobile

Digital Identity is the foundation for granting user access in today's connected enterprise. Dated authentication approaches fall short on both security effectiveness and user experience.

Help protect your organization from visual hacking: Best practices

How serious is the risk of visual hacking in your organization? Consider who may be viewing, photographing and collecting sensitive information from your offices and electronic devices when staff is mobile.

Extortion malware for Android, iOS rose in second half of 2014, report says

By

F-Secure observed an uptick in ransomware as well as malware for both Android and iOS in the second half of last year, according to its new threat report.

Survey highlights millennial, baby boomer habits on corporate devices

By

Sixty-four percent of millennials used their employer-owned device for personal use, compared to 37 percent of baby boomers.

Verizon Wireless, Sprint in $158M settlement with FCC over cramming

By

The Federal Communications Commission (FCC) said Verizon Wireless and Sprint would pay $90 million and $68 million respectively for billing customers for unauthorized third-party texting services charges.

Hackers exploit Starbucks auto-reload feature to steal from customers

Hackers exploit Starbucks auto-reload feature to steal from customers

By

Starbucks customers say auto-reload feature is being used to steal from their linked credit cards and bank accounts.

Mobile threats on the rise, Q1 2015 report shows

Mobile threats on the rise, Q1 2015 report shows

By

Kaspersky Lab saw 3.3 times as many new malicious mobile programs in Q1 2015 than it did in the final quarter of last year.

Koler ransomware variant targets Android users in Canada

Koler ransomware variant targets Android users in Canada

By

The threat actors set up malicious adult websites to distribute the malware, and so far infection rates are estimated to be in the thousands.

Internet security best practices from the Global 1000

The world of IT security is undergoing tremendous change. The unstoppable momentum of the Internet and cloud computing, the ubiquity of mobile devices and the emergence of Internet of things have together turned the IT security landscape upside down.

iPad app glitch delays 74 flights for American Airlines

By

A glitch in an iPad apps pilots use to communicate caused of 74 flight delays for American Airlines.

Forrester estimates that broad EMV chip adoption is half a decade away

Forrester estimates that broad EMV chip adoption is half a decade away

By

EMV, despite its security features over magnetic stripe cards, cannot prevent against "wholesale breaches of large numbers of credit card numbers," report authors said.

Mobile apps riddled with security flaws

By

Andrew Hogg, CEO of Now Source, explains how some of the most popular applications can be riddled with security flaws.

RSA 2015: 'No iOS Zone' attack allows denial-of-service against Apple devices

RSA 2015: 'No iOS Zone' attack allows denial-of-service against Apple devices

By

According to the co-founders of Skycure, which presented on the attack at RSA Conference, Apple has not completely resolved the security issue.

RSA 2015: Contactless payment systems have weaknesses

RSA 2015: Contactless payment systems have weaknesses

By

Contactless payment systems such as EMV cards and Apple Pay are convenient, but are not without weaknesses.

Report: DEA contract supplied agency with Hacking Team spyware

By

Motherboard and Privacy International revealed the contract between DEA and a government supplier.

Today's mobile security threats and tips to enable productivity without compromising data security

The threat landscape is evolving, and mobile threats are on the rise.

Cross-platform RAT 'AlienSpy' targets Mac OS X, Windows and Android users

Cross-platform RAT 'AlienSpy' targets Mac OS X, Windows and Android users

By

The AlienSpy remote access trojan (RAT) is being sold to attackers via subscription plans, ranging from around $20 to $220.

36 percent in survey don't think its necessary to back up data

By

An Avast global survey measuring data preservation habits found that despite not backing up regularly users are concerned with the data in their devices.

Google: Android PHA installs decreased by nearly 50 percent throughout 2014

Google: Android PHA installs decreased by nearly 50 percent throughout 2014

By

The rate of Potentially Harmful Application installs on Android devices decreased nearly 50 percent from early 2014 to later that year, according to a Google report.

Avoid a network stampede

Avoid a network stampede

The rise of IoT will require a completely new approach to network security, says vArmour CEO Timothy Eades.

Debate: Your money is safe online.

Debate: Your money is safe online.

Given the recent headline-grabbing breaches, in this month's debate information security professionals discuss whether or not money is safe online.

Orgs predict $53M risk, on average, from crypto key, digital cert attacks

Orgs predict $53M risk, on average, from crypto key, digital cert attacks

By

In a Ponemon report, 2,300 security pros provided their two-year outlook on cryptographic key and digital certificate attacks.

Protecting work info ranks low in mobile privacy survey

Protecting work info ranks low in mobile privacy survey

By

In the Lookout survey, only five percent of smartphone users said they would take the most steps to protect work-related data.

Study: Mobile app security risk well-known, but enterprises lack proper usage policy

Study: Mobile app security risk well-known, but enterprises lack proper usage policy

By

Although most IT professionals believe mobile apps in the workplace have increased security risks, less than half of organizations have a policy in place to define acceptable mobile app use.

Rogers victimized by ransomware

By

A misstep by an IT employee of Canadian communications conglomerate Rogers Communications allowed the contractual information of 50-70 of the company's business customers to be exposed via Twitter.

Apps submitted to Google Play are now reviewed by 'experts'

Apps submitted to Google Play are now reviewed by 'experts'

By

Despite Google's new review process, mobile security company Lookout recently identified 13 apps with adware that made it into Google Play.

FireEye scans popular Android and iOS apps, nearly 2K vulnerable to FREAK

By

The SSL/TLS vulnerability FREAK can be exploited to force an HTTPS connection to use weaker and, therefore, easier to crack encryption.

iPad POS security

By

David Bozin, vice president of growth development at Bindo discusses mobile POS considerations, with the help of newer technologies.

Yahoo CISO Alex Stamos tweets 'on-demand' password defense

Yahoo CISO Alex Stamos tweets 'on-demand' password defense

By

Three days after Yahoo announced its new "on-demand" passwords (ODP), the company's CISO Alex Stamos took to Twitter to defend the company's decision and address criticism from the security community.

Yahoo releases e2e encryption source code and launches 'on-demand' passwords

Yahoo releases e2e encryption source code and launches 'on-demand' passwords

By

Yahoo took advantage of South by Southwest's (SXSW) opening weekend this week to make major announcements surrounding its services' security, including the launch of its "on-demand" password service.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US