The bill would provide consumers nationwide with similar protections already enforced by a California law.
Once exclusively a BlackBerry shop, the U.S. Department of Defense is close to expanding its mobile device usage to Android and Apple iOS platforms as they prove their enterprise security resiliency.
It's critical that organizations looking to protect themselves from threats introduced via mobile devices look for a solution that identifies devices and applies access policies BEFORE allowing devices on the network.
Attackers wanting to compromise apps in Google's official store leveraged an advertising network to foist their malware to unsuspecting victims.
The American Civil Liberties Union has filed a complaint with the Federal Trade Commission over several major carriers' alleged sluggish patching practices, a concern for enterprises as BYOD pervades the business world.
Attackers use phishing emails, which include links to a fake Adobe Flash update, to lure victims into installing the Stels trojan.
New clues turned up by researchers at the University of Toronto show that an Android malware spy campaign appears to be the work of Chinese hackers, possibly with the assistance of the nation's government or a major corporation.
The ever-increasing use of personal devices has tested enterprise defenses, so plans must be created to meet the challenge, reports James Hale.
Thanks to BYOD, gone are the days of one single mobile device manufacturer or model to support, says Dimension Data Americas' Darryl Wilson.
In a matter of weeks, an Arizona federal judge is expected to decide whether the FBI illegally caught an accused fraudster.
Attached as a malicious APK file in a spear phishing email, once installed, the program siphons data that includes contacts, call logs, SMS messages, and more.
Officials at the University of Mississippi Medical Center posted an online notice, saying they had "insufficient contact information" to individually notify those potentially compromised.
IT departments with a block BYOD policy should be wary of these common workaround attempts or hacks.
Apple ID and iCloud users will now have the option to use the security feature for purchases or account changes.
Known for creating an undeterred web surfing experience and bolstering privacy, Google has decided to remove AdBlock Plus from its Android market place.
The results of a recent report indicate that apps on the iOS mobile platform access more information on a device than Android.
Defendants are charged with inundating consumers with texts promising "free" gift cards - and running sites that profited off the scam.
Tony Ball, senior vice president of identity and access management at HID Global, goes InFocus during the RSA Conference 2013 in San Francisco.
The mobile apps we download have access to an enormous amount of personal data. As we start using our phones and tablets for work, we're also putting corporate data at risk.
The battle between the iOS and Android platforms continues, but with Apple having the edge on security, and Google with innovation, both are at the top of the mobile totem pole.
CISOs shared ways IT security professionals can attain the corporate support they need to implement evolving technologies into their security programs.
Remotium won for its technology that runs mobile applications on public or private clouds so end-users aren't required to store corporate data on their devices.
Ten start-up companies will compete Monday in the "Innovation Sandbox" competition at the annual security conference.
It's an interesting time for information security professionals to converge on the City by the Bay for the 22nd annual RSA Conference. Major corporations everywhere are reeling from breaches, and the threat of foreign attacks has never been more pronounced.
The consumer protection agency said vulnerabilities and the "insecure implementation" of diagnostic software propelled action against the American division of the mobile device maker for a number of security shortfalls.
Our relationship with our devices is deep, and getting deeper. But without access to data, the value of our devices is limited, if not eliminated.
In order to implement effective mobile security, security evangelists must balance risk and cost and speak the language of business.
BYOD has enhanced productivity, but increased security concerns.
In the PC world, attackers prefer to compromise legitimate sites to spread malware. But in the realm of mobile, pornographic sites are the preferred launching pad for viruses.
As the bring-your-own-device movement becomes commonplace and better managed, it's time for security pros to move their focus toward securing the mobile application.