Mobile Security

Mobile Security news, analysis, research, how-to, opinion, and video.

rogue it

Maliciously crafted MKV video files can be used to crash Android phones

Researchers discovered a vulnerability in Android's mediaserver component that can be exploited by malicious apps and websites


android security danger

Stagefright vulnerability allows criminals to send malware by text

Vulnerabilities in Android's "Stagefright" code allows criminals to send malware to any user via text message -- and the user gets infected without even having to open it.

Most Android phones can be hacked with a simple MMS message or multimedia file

Vulnerabilities in the Android multimedia framework allow attackers to remotely compromise devices with ease, a researcher said

Smartwatches

HP: 100% of smartwatches have security flaws

In a recent security assessment of ten smartwatches and their iOS and Android companion applications, every single watch had at least one significant security flaw, according to a new report from HP Fortify

Bogus news app used to deliver Hacking Team spy tool

Trend Micro found the app, along with exploit code and instructions, in the leaked data

Wi-Fi sign

IEEE group recommends random MAC addresses for Wi-Fi security

According to new recommendations by an IEEE study group, the Wi-Fi protocol needs to be updated to use randomly generated MAC addresses for better security and privacy.

threat detection intelligence alert

How to use threat intel to boost mobile security

Integrating threat intelligence feeds with mobile device management platforms can shore up BYOD security.

VPN users, beware: You may not be as safe as you think you are

Thanks to IPv6 leakage, your data could be out there for anyone to see

One third of enterprise iOS devices vulnerable to app, data hijacking attacks

Researchers from FireEye found five flaws that can be exploited by rogue apps installed through the iOS enterprise provisioning system

FTC settles with developers of sneaky cryptocurrency mining app

The Prized app secretly mined virtual currencies on mobile phones

security ciso

How CISOs can create security KPIs and KRIs

The Information Security Forum recommends that CISOs take a four-step approach to creating key performance indicators (KPIs) and key risk indicators (KRIs) to support informed decision-making.

fishing nets

IT: Forget the device, secure the data

We delve deeper into how information security professionals are moving toward practices that secure the data itself rather than securing the device. What are these practices and what are their strengths and pitfalls?

samsung galaxy s6 edge white

Attention Samsung Galaxy Users: Your phone has a big security flaw

Samsung readies fix for a security flaw that may have compromised as many as 600 million phones, including the Galaxy.

apple watch pay

Mobile security: The coming battle of hardware vs. software

According to security experts, there are several paths forward for mobile payments, each with its own security implications

password stock image

Review: The best password managers for PCs, Macs, and mobile devices

10 local and cloud-based contenders make passwords stronger and online life easier for Windows, OS X, iOS, Android, BlackBerry, and Windows Phone users

Dropbox for Business to get mobile management boost

Applications are on the way from partners including AirWatch and MobileIron

internet security with lock

How to use enterprise Wi-Fi security in SMBs

No matter what size your business, using WPA2 security is a good first step to protecting your Wi-Fi network. Don't blow it by using the standard's not-so-secure PSK mode.

mobileiron

Enterprise mobility slowed by security concerns

While mobile technology continues to move forward in all parts of the business, security issues threaten to slow the progress, according to attendees at this week's MobileIron's user conference.

Apple moves to six-digit passcode in iOS 9

The pool of possible six-digit combinations is 1 million, rather than 10,000 for four digits, Apple said

Load More