Mobile Security

Mobile Security news, analysis, research, how-to, opinion, and video.

00 intro
macos sierra auto unlock apple watch 2

stop sign bullet holes

Emerging technologies are poking holes in security

Accelerated change challenges change management, security DevOps and emerging technologies that enable business innovation and opportunities demand fast, frequent change from the enterprise. The speed and regularity as well as the...

security light

20% off Kuna Smart Home Security Outdoor Light & Camera - Deal Alert

Night or day, Kuna’s smart outdoor security camera system detects movement at your door and sends actionable alerts to your mobile device, allowing you to safely take action using Kuna’s lights, HD live video feed, two-way intercom,...

samsung note7 iris setup

How it works: Iris scanning improves smartphone security

Samsung and other vendors are beginning to incorporate iris scanning into their mobile devices. We examine how this security technology works, its advantages and its drawbacks.

solarin

What this expensive ‘secure’ phone tells us about mobile hacking

Mobile security is a bit of a misnomer. Few of us can say we’ve been attacked by a piece of malware or have quarantined an actual virus. Yet, there’s a sneaking suspicion that mobile security is a bigger concern.

smartphoneusing

Report: Smartphone infection rate doubled in first half of 2016

Smartphone infection rates nearly doubled during the first half of this year, from 0.25 percent to 0.49 percent compared to the second half of 2015, according to a report released today by Nokia.

pixelated clouds reflecting on building windows

Experts challenge Skyhigh's patent for cloud-based encryption gateway

Skyhigh Networks, Inc., announced today that it has received a patent for using a hosted gateway to encrypt and decrypt data moving between users and cloud services such as Office 365, but some experts say that the technology new...

group of millennials using mobile devices

5 products leading the enterprise mobile management pack

Companies are moving towards an enterprise mobile management strategy in order to keep up with the increasing demands and risks of a mobile workforce. Here are five companies that, according to Gartner, are leaders in the EMM market. ...

messaging apps threats security privacy thought bubbles

How IT can limit the risk of popular messaging apps

CIOs have battled shadow IT for years, long before the advent of messaging apps such as WhatsApp and Facebook Messenger. Here's how a set of IT pros makes the most of the latest challenge.

video

Samsung Galaxy Note7 iris scanner review

CIO.com's Al Sacco goes hands on with the Samsung Galaxy Note7 smartphone and its new biometric iris scanner.

android logo robot nougat

Google details security features in Android 7.0 'Nougat'

Google shared information on the best new security features in its next major mobile OS update, Android 7.0 'Nougat,' including a faster direct boot, streamlined software updates and enhanced integration with corporate directories.

texting dark

Snowden and Huang hope to help smartphones go dark

NSA whistleblower Edward Snowden and superstar hacker Andrew “bunnie” Huang are working on a device that will let journalists know if their phones are betraying them.

mobile payment wallet money smartphone

Android, iOS bug bounty biz is booming

Hackers who identify and document proven critical software vulnerabilities in Android or iOS stand to cash in big time, thanks to new bug bounty increases from Apple, Google and at least one security firm.

apple logo

CIOs express mixed emotions on Apple’s enterprise evolution

Not all IT leaders are happy with Apple choice to largely keep the enterprise at arm's length, but the company has made notable progress in business. These developments, large and small, helped changed the IT industry's perception of...

samsung pay mobile wallet nfc

Samsung both denies and admits mobile payment vulnerability

Samsung said that reports of a vulnerability in Samsung Pay mobile payments were "simply not true" -- but also admitted that token skimming was, in fact, possible but difficult enough that the potential risk was acceptable

original sale 4102 image

90% off Become an Ethical Hacker With This Complete eLearning Bundle - Deal Alert

With cyberattacks putting everyone on edge, companies are looking for ethical hackers--IT pros paid handsomely to hack their network, expose security flaws, and fix them before someone else breaks in. Learn the tools of the ethical...

Pokémon Go  /  10 Things to know if you're just getting started  [Slide 9]

What awareness gamification programs can learn from Pokemon Go

At the moment, the only intended gamification of Pokemon Go is to encourage people to spend money within the game. There are potentially future uses of the game, such as to get people to spend money at partner vendors. For now...

150817 google marshmallow 06

Qualcomm-powered Android devices plagued by four rooting flaws

Hundreds of millions of Android devices based on Qualcomm chipsets are likely exposed to at least one of four critical vulnerabilities that allow non-privileged apps to take them over.

laptop shock

4 laptop security trends you should know about

These new techniques and products are not as widely known, yet they are effective for any laptop-carrying business worker who needs to fend off the latest attacks.

Load More