Mobile Security

Mobile Security news, analysis, research, how-to, opinion, and video.

managed security service providers
pacemaker xray

android security

Google's Android N strengthens security core

File-based encryption, Mediaserver hardening, and automatic updates will come to Google's mobile platform this summer

samsung google play

60% of enterprise phones still vulnerable to QSEE exploit

Most enterprise users with Android phones are still vulnerable to an exploit that allows attackers to get into their phone's Qualcomm Secure Executive Environment and completely take over the phone, up to and including modifying the...

blackberry priv wireless charging

BlackBerry's Android security survey blatantly promos PRIV

A new survey meant to gauge Android users' thoughts on security and privacy, commissioned by BlackBerry, offers some interesting takeaways but also reads like an ad for the company's PRIV smartphone.

privacy door

FBI/Apple privacy fight left out a major player: The data carriers

The debate over privacy does not begin and end with the recent battle between the FBI and Apple over unlocking an iPhone. The major carriers of the data in smartphones and other devices are also very involved in government access to...

managed security service providers

5 security experts share their best tips for ‘fringe’ devices

Some of the most hackable devices in your network are also probably the most-overlooked.

01 intro

7 ways to prevent mobile break-in

As mobile devices continue to penetrate our society, mobile security is becoming increasingly difficult to manage. Every mobile device we own, whether it’s a phone or a tablet, provides hackers with a new avenue to seize private...

CSO password management survival guide

The CSO password management survival guide

It's time to take the password problem in hand. This free guide from the editors of CSO will help you communicate the challenges and what is at stake and evaluate and choose the right enterprise password management solution for your...

video

Why passwords fail end users

At the 2016 Interop show, Network World got a quick demo of Keeper Security's password management and vault app. The company's CEO, Darren Guccione, also explained why most password methods fail end users, and whether biometrics...

A paranoid user with a laptop computer looks around suspiciously. [credit: Thinkstock]

5 secure habits of the paranoid PC user

Are you getting a little sloppy with your security? Time to shape up. Practice these five habits to protect your data at home, in the office and out in the world.

office printer

Think that printer in the corner isn’t a threat? Think again

Interestingly enough, because a printer is so innocuous and seemingly harmless, that’s the exact reason it poses a threat, according to the security analysts who talked to CSO about this issue.

more productivity tips

IT leaders pick productivity over security

Implementing security measures can make systems run slower and essentially bog down productivity, which is causing some enterprises to abandon effective security measures. Two recent studies highlight the severity of lacking...

150817 google marshmallow 03

Malvertising attack silently infects old Android devices with ransomware

Attackers are using two known exploits to silently install ransomware on older Android devices when their owners browse to websites that load malicious advertisements.

01 whaling title

10 whaling emails that could get by an unsuspecting CEO

Email security company Mimecast has shared a handful of real-life examples of fraud attempts targeted at the person in the corner office.

Cargo shipping containers stacked on dock at night

New sensors help reduce supply chain risks

Better sensors help companies reduce shipping risks and react faster to disruptions, but costs and deployment challenges are still slowing adoption

mobile apps smartphone tablet users business

How to create enterprise apps employees want to use

A good consumer app keeps the user in mind through every stage of development to create the best experience possible. And enterprise apps should not be an exception to this rule. Here’s why.

bad security habits

5 security bad habits (and easy ways to break them)

Your end-users are often the weakest link in your organization's security strategy. Here are five solutions to help users strengthen their security posture.

KeePass master

How to set up a portable, non-cloud-based password manager

Setting up a non-cloud based password manager in which the password database can be accessed from more than one device is easier than it sounds.

mobile security

One-fifth of IT pros say their companies had mobile data breach

IT pros have long been concerned about the potential for security breaches with BOYD; a new survey indicates they're right to be worried.

Load More