Mobile Security

Mobile Security news, analysis, research, how-to, opinion, and video.

linux penguin shoot

securitiy concerns

5 biggest cybersecurity concerns facing CIOs, CISOs in 2016

Carl Leonard, a principal security analyst for Raytheon's Websense cybersecurity software unit, offers insight into the most serious threats CIOs and CISOs are likely to grapple with this year.

apps and data representations being erased from a chalkboard

Containerization moves beyond the full erase

The latest containerization technologies enable IT to create separate, protected areas for work apps and data on employees' personal devices. The challenge is to maintain security.

blackphone

Silent Circle patches Blackphone vulnerability

A report released this morning shows that no phone is 100 percent secure -- but that one company, at least, is able to respond quickly and issue patches immediately.

bad news

Can enterprises keep mobile security threats from driving customers away?

By building intelligent IDS/IPS into an app from the ground up, an enterprise can enable apps to be self-defending against any malicious use of their capabilities.

female executive keyhole security

Top 10 security stories of 2015

In the wake of data breaches, cyber espionage and cybercrime, organizations in 2015 gave security a higher profile than ever before.

fraud infog primary

The year in security, identify theft and fraud

There’s a lot we can say about cybersecurity, identify theft and fraud in 2015, but we’re going to let our infographic tell the story.

medical records healthcare medicine file document claim form doctors office hospital 000000399129

Lost devices account for bulk of healthcare security incidents

Due to reporting guidelines, lost and stolen devices account for 45 percent of all breaches in Verizon's new healthcare data breach report, accounting for 45 percent of around 2,000 incidents with total losses of more than 392 million...

00 predictions title

Security predictions that could make or break your company

Here are some best guesses about 2016 from more than a dozen vendors and analysts.

Security in 2015

By the numbers 2015: The year in security research

Security researchers were almost as busy as cybercriminals in 2015. Here are some of the noteworthy numbers of the past year.

smartphone encryption

Maximum security: Essential tools for everyday encryption

Thanks to technical advances and increased adoption, securing your data and communications is a lot easier than you might think.

150817 google marshmallow 06

Google patches critical media processing and rooting vulnerabilities in Android

A new batch of security fixes for Android address flaws that could allow attackers to compromise devices via rogue emails, Web pages, and MMS messages.

Black Friday ecommerce fraud

Black Friday to Cyber Monday: Mobile commerce up, fraud (mostly) down

Credit card fraud, identity theft and friendly chargebacks were the top types of online fraud during the 4-day online shopping bonanza.

blackberry priv keyboard full

BlackBerry PRIV review: A new standard for Android in enterprise?

CIO.com spent a month testing BlackBerry's first Android smartphone with a focus on the businesspeople and IT managers who will use and support it. The PRIV is the most capable BlackBerry ever, but does it deliver on what may be its...

Privacy (4)

IRS says it will get a warrant before using cell-site simulators

The U.S. Internal Revenue Service is drafting a policy to restrict the use without a warrant of cell-site simulator technology to snoop on the location and other information from mobile phones.

5 childrens gadget

Most hackable devices

Many holiday gifts purchased this season are likely to be connected devices, including smart TVs, tablets, smartphones, notebooks and laptops, and video game consoles. Unfortunately, many of these devices will make homes more...

smartphone encryption

Paris attacks demand 'wake-up call' on smartphone encryption

Deadly terrorist attacks on Friday in Paris, apparently planned by ISIS, have ignited a new round of concerns over smartphone encryption.

byod security

Half of U.S. businesses have no formal BYOD policy for security

Years after the widespread adoption of workplace smartphones, more than half of U.S. companies said they have no formal BYOD (bring your own device) policy to safeguard their enterprises, according to a survey.

nyc power plant

Are vendors on the wrong path where smart plant security is concerned?

Cyber criminals can’t wait for enterprises to mainly apply access controls and encryption as their toughest solution for securing smart plants.

Load More