Mobile

Android trojan spreads through Cutwail spam botnet

By

Attackers use phishing emails, which include links to a fake Adobe Flash update, to lure victims into installing the Stels trojan.

Android malware targeting Tibetans has state-sponsored fingerprints

By

New clues turned up by researchers at the University of Toronto show that an Android malware spy campaign appears to be the work of Chinese hackers, possibly with the assistance of the nation's government or a major corporation.

Beyond BYOD

Beyond BYOD By

The ever-increasing use of personal devices has tested enterprise defenses, so plans must be created to meet the challenge, reports James Hale.

BlackBerry back in the game

BlackBerry back in the game

Thanks to BYOD, gone are the days of one single mobile device manufacturer or model to support, says Dimension Data Americas' Darryl Wilson.

Federal judge to weigh in on FBI's "stingray" cell phone surveillance

By

In a matter of weeks, an Arizona federal judge is expected to decide whether the FBI illegally caught an accused fraudster.

Targeted Android attacks discovered by researchers

Targeted Android attacks discovered by researchers By

Attached as a malicious APK file in a spear phishing email, once installed, the program siphons data that includes contacts, call logs, SMS messages, and more.

Laptop containing patient data goes missing from Mississippi hospital

Laptop containing patient data goes missing from Mississippi hospital By

Officials at the University of Mississippi Medical Center posted an online notice, saying they had "insufficient contact information" to individually notify those potentially compromised.

The perils of blocking BYOD

IT departments with a block BYOD policy should be wary of these common workaround attempts or hacks.

Apple releases two-factor authentication

Apple releases two-factor authentication By

Apple ID and iCloud users will now have the option to use the security feature for purchases or account changes.

Popular ad blocking app nixed from Google Play

By

Known for creating an undeterred web surfing experience and bolstering privacy, Google has decided to remove AdBlock Plus from its Android market place.

Study finds iOS apps to be riskier than Android

Study finds iOS apps to be riskier than Android By

The results of a recent report indicate that apps on the iOS mobile platform access more information on a device than Android.

FTC lodges new set of complaints against alleged cell phone spammers

FTC lodges new set of complaints against alleged cell phone spammers By

Defendants are charged with inundating consumers with texts promising "free" gift cards - and running sites that profited off the scam.

Sponsored video: Tony Ball, senior vice president of identity and access management, HID Global

By

Tony Ball, senior vice president of identity and access management at HID Global, goes InFocus during the RSA Conference 2013 in San Francisco.

BYOD's next challenge? Mobile apps collect user data

The mobile apps we download have access to an enormous amount of personal data. As we start using our phones and tablets for work, we're also putting corporate data at risk.

RSA 2013: iOS safer than Android due to open app model, patching delays

By

The battle between the iOS and Android platforms continues, but with Apple having the edge on security, and Google with innovation, both are at the top of the mobile totem pole.

RSA 2013: CISOs make security - and business - sense of new technologies

By

CISOs shared ways IT security professionals can attain the corporate support they need to implement evolving technologies into their security programs.

RSA 2013: Rookie mobile app security company judged "most innovative"

RSA 2013: Rookie mobile app security company judged "most innovative" By

Remotium won for its technology that runs mobile applications on public or private clouds so end-users aren't required to store corporate data on their devices.

Consumer-driven security inspires entrepreneurial spirit at RSA Conference 2013

By

Ten start-up companies will compete Monday in the "Innovation Sandbox" competition at the annual security conference.

RSA Conference 2013 opens amid non-stop attacks, government warnings

By

It's an interesting time for information security professionals to converge on the City by the Bay for the 22nd annual RSA Conference. Major corporations everywhere are reeling from breaches, and the threat of foreign attacks has never been more pronounced.

FTC whips HTC over poor software coding, developer training and researcher outreach

By

The consumer protection agency said vulnerabilities and the "insecure implementation" of diagnostic software propelled action against the American division of the mobile device maker for a number of security shortfalls.

Connect the dots: Secure everything, everywhere... and that includes performance and productivity

Our relationship with our devices is deep, and getting deeper. But without access to data, the value of our devices is limited, if not eliminated.

Easy math: the mobile security payoff

In order to implement effective mobile security, security evangelists must balance risk and cost and speak the language of business.

Mobile security

Mobile security

BYOD has enhanced productivity, but increased security concerns.

One-fifth of malicious mobile websites are porn-related

By

In the PC world, attackers prefer to compromise legitimate sites to spread malware. But in the realm of mobile, pornographic sites are the preferred launching pad for viruses.

Securing mobile enteprise assets by embracing the app

Securing mobile enteprise assets by embracing the app

As the bring-your-own-device movement becomes commonplace and better managed, it's time for security pros to move their focus toward securing the mobile application.

App owner to pay $800k to settle child privacy charges

By

Path, a company that operates a virtual journal application for iOS and Android devices, agreed to pay the FTC $800,000.

Are you ready for BYOD 2.0?

Are you ready for BYOD 2.0?

This phenomenon sees applications designed for consumers - such as Dropbox, Skype, Google Apps, WordPress, GoToMyPC - finding their way into the corporate tool box.

News briefs: The latest breaches, malware and hacktivist activities

By

This month's news briefs include bits on Android, spammers, breach penalties, crime networks, hacktivism and more.

Applying NAC to mobile

Applying NAC to mobile

A more substantial enterprise mobility framework can be conceived with a combination of NAC, MDM and MAM based on organizational requirements.

Give and go: New Orleans Hornets and Array Networks

Give and go: New Orleans Hornets and Array Networks By

The NBA's New Orleans Hornets needed to provide its off-the-court, but highly mobile staff with a secure method for communicating. It found an enterprise remote access solution that could help.

Sign up for our newsletters

POLL