Mobile Security 

The Millennial Security Risk

Millennials more likely than their baby boomer counterparts to engage in risky security behavior, report finds.

Researchers Warn of Wi-Fi Vulnerability in iOS 8

A specially crafted SSL certificate can be used to crash iOS apps, and even the entire operating system.

Manual Penetration Testing Still Crucial to Smart App Development

With automated security testing, you do not need manual penetration testing when developing apps, right? Wrong!

Los Angeles Streetlights to Be Controlled via Cellular Network

City workers will be able to turn lights on and off remotely, and will be able to dim them or brighten them as needed.

10 Trickiest Mobile Security Threats

Mobile apps are popular with knowledge workers and hackers alike. Which 10 mobile threats are the most problematic for security pros?

Mach37 Accelerates Security Startups

'Cyber accelerator' offers $50,000 and lots of training to security startups.

Insecure Mobile Apps a Big Problem

IBM-sponsored research shows mobile app development is flawed. Big Blue now offers a new platform to help.

IBM: Over a Billion Records Leaked in 2014

A surprising 40 percent of attacks in IBM's X-Force report were listed as 'unknown.'

IBM Exposes Critical Dropbox Vulnerability

Dropbox patches flaw that could have exposed users to risk.

Mobile Payment Fraud a Growing Problem: LexisNexis

Mobile commerce is a prime target for payment fraud, thanks to its novelty and complexity, according to a recent LexisNexis report.

Stolen Laptops, Hard Drives Expose Over 100,000 People's Personal Data

The data potentially exposed includes names, addresses, phone numbers and Social Security numbers.

Gemalto Responds to Alleged SIM Hack

The company says it had no knowledge of any access, and believes its products are secure.

16 Million Mobile Devices Infected with Malware

Infection rates for Android devices are now equal to those of Windows laptops, according to Alcatel-Lucent's Motive Security Labs.

Stolen Computers, Mobile Phones Expose Thousands of Patients' Medical Data

Victims range from home healthcare patients to pediatric eyewear customers.

EMV Is No Payment Security Panacea

Implement EMV and you eliminate payment card fraud, right? Wrong.

How Secure Is Android if Google Won't Patch?

A security researcher alleges that Google won't patch its older Android software for a new vulnerability. Luckily, users have options to boost security for older versions of the OS.

9 Enterprise Security Trends for 2015

Hackers find new twists for some of their favorite tools, like malware and DDoS, which means organizations need to get even more serious about security in 2015.

AT&T Stops Using 'Permacookies' to Track Customer Activity

Verizon, however, is continuing to insert the tracking data into its customers' Web traffic.

Apple Pay: How Secure Is It?

Apple Pay and other emerging mobile payment methods like Google Wallet possess potential security vulnerabilities, yet they are more secure than credit cards.

Startup Spotlight: Security-as-a-Service Bitglass

While most cloud security startups focus on securing cloud infrastructure, Bitglass protects data traveling between corporate networks and SaaS applications.

WireLurker Malware Infects Mac OS X, iOS Devices

The malware has already been downloaded more than 350,000 times.

Verizon Wireless Uses 'Permacookies' to Track Customer Web Activity

The Electronic Frontier Foundation's Jacob Hoffman-Andrews says AT&T and Sprint may be using similar headers as well.

Mobile Security's Budget Shortfall

Sixty-four percent of companies surveyed by the Ponemon Institute do not believe they have enough budget to adequately secure mobile devices.

Mobile Device Management Not Just for Big Companies

While mobile device management is often found at companies with big workforces, it can also help small companies with their mobile initiatives.

Android, iOS Malware Targets Hong Kong Protesters

Lacoon researchers describe the iOS version of the malware as the 'first iOS Trojan linked to Chinese government cyber activity.'