News, blogs, analysis, tips, discussion and how-to about mobile security.
Thu, March 06, 2014 - The tool can be used to add malicious functionality to legitimate applications, researchers from Symantec said
Thu, March 06, 2014 - And without remote management, getting patches onto devices scattered throughout the organization is hit or miss.
Wed, March 05, 2014 - Human rights groups are using metadata to verify the authenticity of eyewitness footage
Wed, March 05, 2014 - American workers don't get too worked up about lost or stolen mobile phones -- even if those phones contain company data. A large percentage think it's not their problem and don't change their security practices afterwards. Are CIOs partly to blame for not setting stricter and clearer mobile security policies?
Wed, March 05, 2014 - When it comes to mobile devices, it's well known that malware writers like to target Android. But a threat report published today by security firm F-Secure puts in perspective why Android malware attacks often flop and why Android itself is no pushover.
Wed, March 05, 2014 - A fake version of Netflix that steals personal data and sends it to Russia has been found on several phone models
Mon, March 03, 2014 - Fujitsu may incorporate its palm scanners in smartphones as a means of verifying a user's identity.
Sat, March 01, 2014 - In the past week, two new ultra secure smartphones have been in the news. One is called the Blackphone. The other is called the Black phone. The difference in their names is a space. Here's what we know about the two most secure smartphones ever created.
Fri, February 28, 2014 - The app exposes information about attendees in a SQLite database file, according to IOActive
Thu, February 27, 2014 - Aerospace and defense company Boeing this week rolled out the Boeing Black a a heavily secured Android smartphone designed for use by the U.S. military and intelligence agencies, which a no kidding a will essentially self-destruct if tampered with.
Wed, February 26, 2014 - After acquiring mobile application management company Bitzer Mobile late last year, Oracle today announced that it has taken Bitzer's basic "container" technology for Apple ioS and Google Android and linked it to identity management.
Wed, February 26, 2014 - Gen-Xer's and Millenials' different behaviors protecting sensitive information could be a concern for employers.
Tue, February 25, 2014 - Uhuru Mobile is a new ROM derived from Cyanogen that aims to make Android phones more secure
Tue, February 25, 2014 - The captured touch screen data could be used to reconstruct what users typed