Mobile Security

Mobile Security | News, how-tos, features, reviews, and videos

angry android

Did Android get a case of Stagefright?

Recent – and mostly incorrect – reports of an Android phone system hack have finally been put to rest by the only source that matters.

rogue it

Why enterprises are embracing rogue IT

IT departments used to fear employees walking through the door armed with smartphones, tablets and personal cloud storage accounts. But much of that initial fear has subsided, as companies realize embracing rogue IT can lead to better...

Most Android phones can be hacked with a simple MMS message or multimedia file

Vulnerabilities in the Android multimedia framework allow attackers to remotely compromise devices with ease, a researcher said

samsung galaxy s6 edge white

Attention Samsung Galaxy Users: Your phone has a big security flaw

Samsung readies fix for a security flaw that may have compromised as many as 600 million phones, including the Galaxy.

samsung galaxy s6 edge white

Galaxy S6 edge an impressive enterprise phone — with one big exception

This enterprise-oriented Samsung Galaxy S6 edge review looks at the strengths and shortcomings of the hottest new Android phone from a business perspective. Hint: It has a glaring Achilles heel.

android biohack nfc chip embedded in hand

Florida (mad)man inserts NFC chip in hand for Android 'biohack'

A hacker reportedly embedded an NFC chip inside his hand to infect and control Android devices. The exploit seems relatively inane, but the concept of 'biohacking' could have far-reaching security implications.

healthcare apps thinkstock

What happens with data from mobile health apps?

Health IT experts caution of lax cyber hygiene in the medical community, urge policymakers to address privacy issues.

blackberry secusmart secutablet cebit

BlackBerry teams with Samsung on locked-down, high-priced tablet

BlackBerry announced SecuTABLET, a pricey new tablet PC built with Samsung hardware and the Android OS that’s designed for public sector and government use.

clinton shadow it

Hillary Clinton is now the face of shadow IT

Even if the former secretary of state set up a private mail server purely for the convenience of using a single phone for both government work and personal use, Hillary Clinton is now the poster child for the dangers of rogue IT....

Hackers

The Internet of Dangerous Things

The Internet of Dangerous Things is made up of Things that Annoy, Things that Spy and Things that Destroy. Dealing with these dangerous things will require a unique security architecture referred to as 'Fault Lines and Fuses'...

android for work

Android for Work Pushes Google Further Into Enterprise

Google is courting enterprise customers like never before, but it has lacked a proper mobility framework for Android since the OS debuted. Now the company wants to change the game with Android for Work, but could its efforts prove to...

mobile business apps graphs data presentation

Tech Firms Create 'ACE' Standards for Enterprise Apps

A group of software companies this week proposed a set of development standards for enterprise apps that could make it easier for IT to manage and secure Android and iOS apps using popular EMM products.

securitytopstories

10 Top Security Stories of 2014

From data breaches and cyberthreats to uncertainty around mobile, cloud and the Internet of Things, these are the security stories that dominated 2014.

verizon tracking

Verizon is Tracking Mobile Users Online, Researcher Says

Verizon Wireless is using cookie-like tokens that let advertisers track customers on the Web so they can serve targeted ads, according to an Electronic Frontier Foundation researcher.

iphone password 2

An Easy Way to Dramatically Improve iPhone (or Any Phone) Security

A password with letters and numbers is a much better way to protect your phone than a four-digit "simple passcode."

apple pay 4

Security, Payments Experts Talk Apple Pay

Three security and payments industry experts discuss the pros and cons of Apple's new iPhone-based contactless payment system, Apple Pay.

remote worker bathroom

The Digital Worker's Guide to Doing Business on the Go

Today's workers must do an increasing amount of work outside the office and home. If you're one of them, these six tips will keep you productive, secure, comfortable and secure -- all without scrambling to find a power outlet.

healthcare security hp

Medical Device Security Benchmarks Emerging

In recent weeks, the FDA and the Center for Internet Security have released guidance documents on medical device security. While there are no hard and fast recommendations, given the diverse types of devices and environments in which...

on the road with byod image.jpg

BYOD Road Warrior

Three takeaways from discussions with customers

082614 surface pro 3

6 Tips for Replacing Your Windows Laptop With a Surface Pro 3

Planning to ditch your laptop for a Windows tablet such as the Surface Pro 3? These tips will help you set up, secure and make the most of your new device.

Load More
You Might Also Like