Mobile Security

Mobile Security news, analysis, research, how-to, opinion, and video.

apple pay 4

Android ransomware 'Koler' turns into a worm, spreads via SMS

The Koler ransomware locks the device screen and displays fake messages from police agencies


remote worker bathroom

The Digital Worker's Guide to Doing Business on the Go

Today's workers must do an increasing amount of work outside the office and home. If you're one of them, these six tips will keep you productive, secure, comfortable and secure -- all without scrambling to find a power outlet.

security encryption key

Once the FBI Has a Backdoor Into Your Smartphone, Everyone Does

FBI director James Comey believes tech companies should be forced to insert back doors to bypass encryption on smartphones. But experts say once that happen,s security is moot and anyone can breach your privacy.

New technique allows attackers to hide stealthy Android malware in images

The attack could be used to distribute malware through applications that appear harmless, researchers said

healthcare security hp

Medical Device Security Benchmarks Emerging

In recent weeks, the FDA and the Center for Internet Security have released guidance documents on medical device security. While there are no hard and fast recommendations, given the diverse types of devices and environments in which...

ios threats

Top 6 Threats to iOS Devices

Given the recent iOS update and iPhone announcement, a security group provides tips to fend off threats to your device.

Android SMS worm Selfmite returns, more aggressive than ever

A new version of the worm is causing infected devices to send thousands of spam text messages and has spread to 16 countries so far

Four-digit passcodes remain a weak point in iOS 8 data encryption

Longer passwords would be more resistant to brute-force attacks

Almost half of Android devices still have a vulnerable browser installed

The percentage is much higher in some countries and lower in the U.S, security firm Lookout estimates

keyboard app security

Alternate Keyboard Apps: Too Risky For Your Smartphone?

Alternative keyboard apps are just one glaring example of how protecting your privacy requires diligence.

Is that used iPad actually stolen? Apple creates tool for would-be buyers to check

The tool will help prospective buyers of used iPhones and iPads to determine if the devices were lost or stolen

Malware program targets Hong Kong protesters using Apple devices

The program is related to an Android one that seeks to spy on activists, Lacoon Mobile Security said

cell tower

Rogue Cell Towers Discovered in Washington, D.C.

After initially discovering more than a dozen rogue cell towers in the U.S., ESD America and IntegriCell discovered more questionable towers in the nation's capitol, 15 of them to be exact. Ownership remains unknown, but Tuesday's...

byod security

Is a Remote-Wipe Policy a Crude Approach to BYOD Security?

While the capability to remotely wipe data from lost or stolen mobile phones may help CIOs sleep at night, it may be an outdated approach to BYOD security.

082614 surface pro 3

6 Tips for Replacing Your Windows Laptop With a Surface Pro 3

Planning to ditch your laptop for a Windows tablet such as the Surface Pro 3? These tips will help you set up, secure and make the most of your new device.

Data protection authorities find privacy lapses in majority of mobile apps

One in three applications request excessive permissions, and privacy information is inadequate in 85 percent of them, a study found

Samsung Touts Enterprise Uses for Tab Active and Knox

Samsung is using the stage at this week's Super Mobility conference to promote its upcoming Galaxy Tab Active rugged tablet, its Knox security and management software, and even its Gear VR headset to enterprise users.

ss apple iphone evolution carousel 100412891 orig

Security Questions You Should Ask About Apple Pay

Security pros reacted positively to Apple Pay, but withheld their full endorsement until the mobile payment system could be tested outside of the company’s laboratories.

Popular Android apps fail basic security tests, putting privacy at risk

Instagram and Grindr stored images on their servers that were accessible without authentication

Load More