Mobile Security

Mobile Security news, analysis, research, how-to, opinion, and video.

honda ridgeline interior
01 branches

WhatsApp (1)
Update

WhatsApp vulnerability could expose messages to prying eyes, report claims

A vulnerability in the popular messaging service WhatsApp could allow Facebook to read supposedly encrypted messages.

data breach predictions

5 data breach predictions for 2017

To help you stay ahead of emerging threats, here are five key data breach trends that you should anticipate in 2017.

nordvpn

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

NordVPN has discounted their popular VPN software 72%. Use our link and see the discount applied when you click "buy now".

170104 blackberry 2

TCL targets Apple, Samsung with new BlackBerry handset

For a brand that's been written off by many, TCL Communication has big plans for BlackBerry.

wearable smart watch

Data breaches through wearables put target squarely on IoT in 2017

Security needs to be baked into IoT devices for there to be any chance of halting a DDoS attack, according to security experts.

mobile device management

Top EMM stories of 2016

With a growing number of mobile devices entering the workplace, IT is focused on implementing easy, scalable solutions for enterprise mobile management. Here are 10 stories that look at the growing trend of EMM.

01 upright

How to make sure your data doesn’t crash and burn

10 tips to protecting your data while in-flight.

iphone security stock

Apple's App Transport Security extension should concern IT

Apple backtracked on its 'App Transport Security' mandate, which would require all iOS apps to use secure network connections by 2017. The decision could affect CIOs and mobile administrators.

iot security

BlackBerry unveils BlackBerry Secure for enterprise IoT mobile security

BlackBerry touted a comprehensive mobile-security platform for a variety of IoT devices connected to enterprises

thieving magpie

U.S. and U.K. spy agencies have been intercepting in-flight phone calls for years

U.S. and U.K. spy agencies have been monitoring in-flight mobile phone users for years, according to new revelations from the trove of documents leaked by former NSA contractor Edward Snowden.

cloud data warehouse

Security pros most worried about clouds, mobile

Companies were least prepared to assess the security risks of cloud and mobile technologies, according to a survey of cybersecurity professionals released this morning. Overall, the confidence levels of security professionals that...

fbi trump iphone

A year after terrorist attacks, phone privacy laws unchanged – but watch out for Trump

Although the perpetrators of the San Bernardino mass shooting were killed in a gun battle with law enforcement within hours of the attack, the FBI’s interest in one terrorist’s iPhone precipitated a public standoff with Apple that...

cybersecurity budgets

Security budgets continue to grow, but is it enough?

Cybersecurity is now a top concern for businesses, but the reality is that it should have been on their radar years ago. Why did businesses wait so long to invest in cybersecurity?

online shopping e-commerce

Holiday shopping by mobile phone? Beware fake apps and bad Wi-Fi hotspots

The smartphone risk is higher this year than in 2015. There are more active cyber criminals and many more shoppers using smartphones to find products and make purchases, either via Wi-Fi in stores or online in other locations.

01 pragmatic

How to maintain data and document security with a mobile workforce

As security leaders, we want to allow your teams to move as fast as possible and not deploy a policy or technology because someone touts it as the best way to do something. Security vendor Conga provides these tips for that healthy...

cloud building security

How to protect your marketing team amidst security threats

Protect your marketing team as security threats loom with these tips and best practices.

smartphone digital

Black Hat Europe: IoT devices can hack phones

The Internet of things (IoT) has already been used to launch the biggest DDoS attacks ever, but now it represents a potential path for attackers to compromise cell phones.

bullseye hospital healhcare

Unencrypted pagers a security risk for hospitals, power plants

For most of us, pagers went out when cell phones came in, but some companies are still using them and when the messages sent without encryption, attackers can listen in and even interfere with the communications

Load More