Mobile Security

Mobile Security news, analysis, research, how-to, opinion, and video.

healthcare apps thinkstock

New mobile-malware detection technique uses gestures

The technology checks if attempts to use certain phone functions are accompanied by natural gestures users are expected to make


mobile security

9 security gadgets for mobile devices

If you use your smartphone or tablet for work, you need to keep your data secure when you're on the go. We look at nine gadgets that try to keep your important data out of the hands of others.

Android flaw puts personal data at risk for millions

A flaw in Android could allow apps to be modified or replaced by malware, Palo Alto Networks said.

Mobile ‘sextortion’ schemes on rise, Trend Micro reports

Sextortion rings convince victims to record themselves performing sexual acts and threaten to distribute the recordings to all their contacts unless they pay up, according to a report by Trend Micro.

IBM: Mobile app security stinks

An IBM/Ponemon study released today found large companies, including many in the Fortune 500 aren’t properly securing mobile apps they build for customers nor their corporate and BYOD mobile devices.

Hundreds of Android and iOS apps are still vulnerable to FREAK attacks

FireEye's findings highlight how even serious software flaws can take a long time to get fixed

blackberry secusmart secutablet cebit

BlackBerry teams with Samsung on locked-down, high-priced tablet

BlackBerry announced SecuTABLET, a pricey new tablet PC built with Samsung hardware and the Android OS that’s designed for public sector and government use.

BlackBerry teams with Samsung and IBM to offer governments a secure tablet

The SecuTablet is a modified Samsung Galaxy Tab S 10.5 bundled with security management software and a hardware encryption module

clinton shadow it

Hillary Clinton is now the face of shadow IT

Even if the former secretary of state set up a private mail server purely for the convenience of using a single phone for both government work and personal use, Hillary Clinton is now the poster child for the dangers of rogue IT....

Hackers

The Internet of Dangerous Things

The Internet of Dangerous Things is made up of Things that Annoy, Things that Spy and Things that Destroy. Dealing with these dangerous things will require a unique security architecture referred to as 'Fault Lines and Fuses'...

Mobile marketing apps

2,400 unsafe apps on user phones in large firms

The average large global enterprise has about 2,400 unsafe apps on the mobile devices in its environment, according to a new study from mobile security vendor Veracode.

security protection defending shield soldier battle warrior

5 Common Wi-Fi Attacks – and How to Defend Against Them

In addition to using strong passwords, you need to prepare your network for these types of attacks. Here are some common vulnerabilities and how to protect against them.

android for work

Android for Work Pushes Google Further Into Enterprise

Google is courting enterprise customers like never before, but it has lacked a proper mobility framework for Android since the OS debuted. Now the company wants to change the game with Android for Work, but could its efforts prove to...

mobile business apps graphs data presentation

Tech Firms Create 'ACE' Standards for Enterprise Apps

A group of software companies this week proposed a set of development standards for enterprise apps that could make it easier for IT to manage and secure Android and iOS apps using popular EMM products.

google map location pin

Geofencing Could Add Security Layer for Mobile Devices

Geofencing technology -- tracking the location of a mobile device -- could offer an extra layer of security for enterprises trying to manage both company-owned and employee-owned devices. However, the technology can also raise worries...

Finnish companies join forces to build secure OS for smartphones and tablets

A new version of Jolla's Sailfish OS is getting locked down with the help of SSH

cisco security malware 625x416

Malware Creators Embraced Mobile, Cryptoransom Malware Last Year

The malware landscape changed last year compared to previous years, with attackers increasingly focus on the mobile channel and embracing cryptoransomware, according to a new report from Trend Micro

Android malware fakes phone shutdown to steal data

The malware works in the background after pretending to shut down a phone, AVG said.

mobile contact tips custom vibrations 3

Commercial Spyware Invades Enterprises

Two out of every 1,000 employee smartphones in the U.S. are infected with commercial "child-monitoring" spyware, according to a first-of-its-kind study by security firms Lacoon and Check Point.

Load More