Mobile

Privacy-bolstering "Apps Act" introduced in House

By

The bill would provide consumers nationwide with similar protections already enforced by a California law.

Pentagon clears new versions of Samsung, BlackBerry for mobile use

Pentagon clears new versions of Samsung, BlackBerry for mobile use

Once exclusively a BlackBerry shop, the U.S. Department of Defense is close to expanding its mobile device usage to Android and Apple iOS platforms as they prove their enterprise security resiliency.

Post-connect network visibility: A fox in the henhouse for network security

It's critical that organizations looking to protect themselves from threats introduced via mobile devices look for a solution that identifies devices and applies access policies BEFORE allowing devices on the network.

BadNews infections in Google Play spread premium-rate SMS trojan

By

Attackers wanting to compromise apps in Google's official store leveraged an advertising network to foist their malware to unsuspecting victims.

ACLU asks FTC for help forcing mobile carriers to patch bugs faster

By

The American Civil Liberties Union has filed a complaint with the Federal Trade Commission over several major carriers' alleged sluggish patching practices, a concern for enterprises as BYOD pervades the business world.

Android trojan spreads through Cutwail spam botnet

By

Attackers use phishing emails, which include links to a fake Adobe Flash update, to lure victims into installing the Stels trojan.

Android malware targeting Tibetans has state-sponsored fingerprints

By

New clues turned up by researchers at the University of Toronto show that an Android malware spy campaign appears to be the work of Chinese hackers, possibly with the assistance of the nation's government or a major corporation.

Beyond BYOD

Beyond BYOD By

The ever-increasing use of personal devices has tested enterprise defenses, so plans must be created to meet the challenge, reports James Hale.

BlackBerry back in the game

BlackBerry back in the game

Thanks to BYOD, gone are the days of one single mobile device manufacturer or model to support, says Dimension Data Americas' Darryl Wilson.

Federal judge to weigh in on FBI's "stingray" cell phone surveillance

By

In a matter of weeks, an Arizona federal judge is expected to decide whether the FBI illegally caught an accused fraudster.

Targeted Android attacks discovered by researchers

Targeted Android attacks discovered by researchers By

Attached as a malicious APK file in a spear phishing email, once installed, the program siphons data that includes contacts, call logs, SMS messages, and more.

Laptop containing patient data goes missing from Mississippi hospital

Laptop containing patient data goes missing from Mississippi hospital By

Officials at the University of Mississippi Medical Center posted an online notice, saying they had "insufficient contact information" to individually notify those potentially compromised.

The perils of blocking BYOD

IT departments with a block BYOD policy should be wary of these common workaround attempts or hacks.

Apple releases two-factor authentication

Apple releases two-factor authentication By

Apple ID and iCloud users will now have the option to use the security feature for purchases or account changes.

Popular ad blocking app nixed from Google Play

By

Known for creating an undeterred web surfing experience and bolstering privacy, Google has decided to remove AdBlock Plus from its Android market place.

Study finds iOS apps to be riskier than Android

Study finds iOS apps to be riskier than Android By

The results of a recent report indicate that apps on the iOS mobile platform access more information on a device than Android.

FTC lodges new set of complaints against alleged cell phone spammers

FTC lodges new set of complaints against alleged cell phone spammers By

Defendants are charged with inundating consumers with texts promising "free" gift cards - and running sites that profited off the scam.

Sponsored video: Tony Ball, senior vice president of identity and access management, HID Global

By

Tony Ball, senior vice president of identity and access management at HID Global, goes InFocus during the RSA Conference 2013 in San Francisco.

BYOD's next challenge? Mobile apps collect user data

The mobile apps we download have access to an enormous amount of personal data. As we start using our phones and tablets for work, we're also putting corporate data at risk.

RSA 2013: iOS safer than Android due to open app model, patching delays

By

The battle between the iOS and Android platforms continues, but with Apple having the edge on security, and Google with innovation, both are at the top of the mobile totem pole.

RSA 2013: CISOs make security - and business - sense of new technologies

By

CISOs shared ways IT security professionals can attain the corporate support they need to implement evolving technologies into their security programs.

RSA 2013: Rookie mobile app security company judged "most innovative"

RSA 2013: Rookie mobile app security company judged "most innovative" By

Remotium won for its technology that runs mobile applications on public or private clouds so end-users aren't required to store corporate data on their devices.

Consumer-driven security inspires entrepreneurial spirit at RSA Conference 2013

By

Ten start-up companies will compete Monday in the "Innovation Sandbox" competition at the annual security conference.

RSA Conference 2013 opens amid non-stop attacks, government warnings

By

It's an interesting time for information security professionals to converge on the City by the Bay for the 22nd annual RSA Conference. Major corporations everywhere are reeling from breaches, and the threat of foreign attacks has never been more pronounced.

FTC whips HTC over poor software coding, developer training and researcher outreach

By

The consumer protection agency said vulnerabilities and the "insecure implementation" of diagnostic software propelled action against the American division of the mobile device maker for a number of security shortfalls.

Connect the dots: Secure everything, everywhere... and that includes performance and productivity

Our relationship with our devices is deep, and getting deeper. But without access to data, the value of our devices is limited, if not eliminated.

Easy math: the mobile security payoff

In order to implement effective mobile security, security evangelists must balance risk and cost and speak the language of business.

Mobile security

Mobile security

BYOD has enhanced productivity, but increased security concerns.

One-fifth of malicious mobile websites are porn-related

By

In the PC world, attackers prefer to compromise legitimate sites to spread malware. But in the realm of mobile, pornographic sites are the preferred launching pad for viruses.

Securing mobile enteprise assets by embracing the app

Securing mobile enteprise assets by embracing the app

As the bring-your-own-device movement becomes commonplace and better managed, it's time for security pros to move their focus toward securing the mobile application.

Advertisement

How to Prevent Insider Threats!

POLL