Mobile Security

Mobile Security news, analysis, research, how-to, opinion, and video.

150817 google marshmallow 03
closeup of hand interacting with smartphone

5 details you may miss in apples new macs

Most Apple devices lack proper security for the enterprise

Apple's Macs, iPhones and iPads are common in the modern workplace, but relatively few of these devices comply with standard security requirements, according to a new survey.

blackhat2015

Black Hat 2015: Why digital security matters

The recent Black Hat cybersecurity and hacking conference in Las Vegas shows why digital security should matter to everyone.

Vulnerability in enterprise-managed iOS devices puts business data at risk

A vulnerability in the iOS sandbox for third party applications, like those installed by companies on their employees' devices, can expose sensitive configuration settings and credentials.

Another serious vulnerability found in Android's media processing service

The Android service that processes multimedia files has been the source of several vulnerabilities recently, including a new one that could give rogue applications access to sensitive permissions.

Zero-day flaw in Google Admin app allows malicious apps to read its files

A vulnerability in the Google Admin application for Android can allow rogue applications to steal credentials that could be used to access Google for Work accounts.

Zero-day flaw in Google Admin app allows malicious apps to read its files

Attackers could obtain credentials used to manage Google for Work accounts

Google has another try at patching Stagefright flaw

Google has sent the patch to its partners and will fix its Nexus line of devices

fingerprint hacking

What fingerprint hacking could mean to IT projects

Fingerprints aren't like account numbers and passwords. They are yours for a lifetime and can't be changed. What if yours gets hacked?

Use SAP's mobile platform? Patch now to avoid these 'high risk' vulnerabilities

The flaws could give attackers access to encrypted information

Bastille promises to find malicious wireless devices in corporate networks

Startup Bastille can flag suspicious radio traffic within enterprises to give security pros a means for keeping an eye on wireless Internet of Things devices that would otherwise elude detection.

Mobile banking apps in developing nations have weak security

Attackers could already be using software vulnerabilities to steal money

BlackBerry denies its OS was to blame in Jeep Cherokee hack

The company claims the cause of the vulnerability lies in how the software stack was assembled by Chrysler

Attackers could take over Android devices by exploiting built-in remote support apps

Researchers discovered weaknesses in the remote support tools pre-installed on Android devices by manufacturers and carriers

Android device makers to release monthly security fixes

They're starting now with a fix for a major vulnerability called Stagefright

angry android

Did Android get a case of Stagefright?

Recent – and mostly incorrect – reports of an Android phone system hack have finally been put to rest by the only source that matters.

rogue it

Why enterprises are embracing rogue IT

IT departments used to fear employees walking through the door armed with smartphones, tablets and personal cloud storage accounts. But much of that initial fear has subsided, as companies realize embracing rogue IT can lead to better...

Maliciously crafted MKV video files can be used to crash Android phones

Researchers discovered a vulnerability in Android's mediaserver component that can be exploited by malicious apps and websites

android security danger

Stagefright vulnerability allows criminals to send malware by text

Vulnerabilities in Android's "Stagefright" code allows criminals to send malware to any user via text message -- and the user gets infected without even having to open it.

Load More