Mobile Security

Mobile Security news, analysis, research, how-to, opinion, and video.

heart monitor
nordvpn

1 byod

7 ways MDM threatens employee privacy

To understand the extent to which MDM solutions could monitor and control BYOD devices, the Bitglass research team installed MDM software on several employees’ personal mobile devices with their permission. The outcome? Complete...

bodium castle fortress

How Google reinvented security and eliminated the need for firewalls

In some ways, Google is like every other large enterprise. It had the typical defensive security posture based on the concept that the enterprise is your castle and security involves building moats and walls to protect the perimeter. ...

security light

25% off Kuna Smart Home Security Outdoor Light & Camera - Deal Alert

Night or day, Kuna’s smart outdoor security camera system detects movement at your door and sends actionable alerts to your mobile device, allowing you to safely take action using Kuna’s lights, HD live video feed, two-way intercom,...

rtxxzvx2

Cisco Umbrella cloud service shapes security for cloud, mobile resources

In an attempt to address such anxieties Cisco today announced Umbrella, a secure, cloud-based gateway, based on technology from OpenDNS and other technologies it acquired such as CloudLock as well as existing Cisco security services...

BlackBerry

BlackBerry offers secure mobile communications platform for developers

BlackBerry announced a new line of business to provide developers with a secure, cloud-based, mobile communications platform for texting, voice, video and file sharing.

01 workforce

7 musts for any successful BYOD program

Mobile devices, mobile apps and the networks they use are now essential to satisfy customers, collaborate more effectively with suppliers, and keep employees productive anytime and anywhere.

credit card fraud

Online card fraud up as thieves avoid more secure chip cards for in-store payments

Deterred by more secure chip cards for in-store payments, thieves have resorted to stealing credit-card numbers and passwords or opening new accounts with false credentials to use in making online payments for purchases, according to...

tim cook

FBI v. Apple: One year later, it hasn’t settled much

At the one-year anniversary of the battle between the FBI and tech giant Apple over unlocking an iPhone, surveillance and privacy rules have not really changed. But they could this coming year, and the debate over that is as intense...

20170127 trump may 2

Trump’s unsecure Android phone highlights common security dilemma

As CIOs and IT security pros already know, strong security technology can still be undermined if end users don't follow safe cyber practices.

nissan leaf autonomous drive

How to protect your data, your vehicles, and your people against automotive cyberthreats?

CSO explores the vulnerabilities and risks of automotive cyberattacks and methods for securing your data, human resources, and the connected vehicle environment.

digital security profiles primary

What privacy profile do you fit?

In an era of constant likes and shares, where is the privacy line drawn? Are you someone who worries about being watched as you purchasing an item online? Or do you consider loss of privacy the price you pay for having the world at...

donald trump president elect

Report: Trump still uses his unsecured Android phone to tweet

Even after being given a new, secure device just before his inauguration, President Trump still reportedly uses his old phone.

honda ridgeline interior

How vulnerable are you behind the wheel of your connected car?

Remember when all you had to worry about with your car is getting an oil change every 3,000 miles. Today’s connected cars are miles ahead technologically speaking of those “dumb” vehicles, but drivers could see a bumpy ride if thieves...

01 branches

How to keep branch offices as secure as corporate HQ

Satellite worksites can cause big headaches for tech pros tasked with keeping company assets secure. We talked to a number of tech pros to find out more about the dangers—and the solutions.

WhatsApp (1)
Update

WhatsApp vulnerability could expose messages to prying eyes, report claims

A vulnerability in the popular messaging service WhatsApp could allow Facebook to read supposedly encrypted messages.

data breach predictions

5 data breach predictions for 2017

To help you stay ahead of emerging threats, here are five key data breach trends that you should anticipate in 2017.

170104 blackberry 2

TCL targets Apple, Samsung with new BlackBerry handset

For a brand that's been written off by many, TCL Communication has big plans for BlackBerry.

wearable smart watch

Data breaches through wearables put target squarely on IoT in 2017

Security needs to be baked into IoT devices for there to be any chance of halting a DDoS attack, according to security experts.

Load More