Mobile Security 

Carrier Pre-Loads Expand Keeper's Mobile Password Footprint

Mobile password manager app continues to expand user base, thanks to new carrier partnerships.

6 Mobile Security Predictions for 2016

Big changes for mobile security are ahead in 2016, predict mobile security experts.

Startup Spotlight: Bluebox Security's Mobile App Security

Bluebox Security's platform boosts mobile app security without making extra work for developers.

Shevirah Moving Forward for Enterprise Mobile Pen Testing [VIDEO]

Security innovator Georgia Weidman discusses what her new startup is doing to help enterprise mobile security.

Only 28 Percent of Consumers Are Fully Confident in Mobile Device Security

Still, 32 percent use their mobile devices to send work-related emails, a recent study found.

Can Mobile Apps Defend Themselves? Yes, Says Bluebox

Bluebox's approach goes beyond providing just a security wrapper for mobile applications.

Is Jailbreaking Apple Devices Always a No-No?

Apple and enterprise IT teams discourage jailbreaking Apple devices – and with good reason. But is jailbreaking always a bad thing?

All about Authentication, Apps for Nymi

Canadian startup Nymi is building a developer ecosystem for its biometric authentication technology.

Android Tablets Sold on Amazon Infected with Cloudsota Trojan

The tablets have been sold and delivered to over 17,000 customers in more than 150 countries.

Ransomware Is Now the Leading Mobile Malware Threat

And porn sites are now the top mobile infection vector, according to Blue Coat.

Top 20 Android Security Apps

While it used to be necessary to deploy an anti-virus app along with a separate anti-theft app and perhaps an individual app locker, most Android security solutions now include all of that functionality in a single app. This list includes mostly broad-based Android security solutions, along with one dedicated anti-theft app and three password management options.

48 Percent of Used Hard Drives Sold Online Contain Residual Data

The same is true of 35 percent of used mobile devices, according to a recent study.

Unlocking Smartphones: PINs, Patterns or Fingerprints?

PINs, patterns and fingerprints are all options for unlocking mobile devices. But which option is most secure?

38 Percent of IT Security Pros Don't Participate in Their Own BYOD Programs

And 28 percent of enterprises do nothing at all about mobile security, a recent Bitglass survey found.

Apple Watch Security Risks (and Benefits)

With the Apple Watch, as with smartphones before it, security pros need to proactively prepare for the mobile device's entry into the workplace.

87 Percent of Business, IT Pros Expect Mobile Payments Breaches to Grow

But 42 percent have used mobile payments this year regardless of the risks, a recent ISACA survey found.

Millions Infected by Malware in Apple App Store

The malware is capable of launching phishing attacks and stealing data from the user's clipboard.

How to Fight Zombie App-ocalypse

"Zombie" apps are an often overlooked BYOD security threat. User education and application whitelisting can reduce risks associated with these dead and stale apps.

Using Two-Factor Authentication for Mobile Security

Reduce the likelihood of having your mobile device hacked by using two-factor authentication.

225,000 Apple Credentials Stolen via New iOS Malware

It's the 'largest known Apple account theft caused by malware,' according to Palo Alto Networks researchers.

Apple vs. Android: Mobile Security Pros and Cons

Both Apple's iOS and Android have security strengths and weaknesses, experts say.

10 Free or Cheap WiFi Security Testing Tools

Do not kid yourselves, security professionals. You need more than one WiFi security testing tool. Here are 10 free or inexpensive options.

Certifigate Flaw Exposes Android Users to Risk [VIDEO]

Remote diagnostic tools from OEMs that are supposed to help Android users, could instead be used to hurt them.

Google Doubles Down on Android Security at Black Hat

Google's Android security chief discusses Stagefright and more in Black Hat address.

Zimperium Takes Aim at Mobile Security [VIDEO]

Smartphone security isn't quite the same as desktop security. Zimperium researchers discuss the pitfalls of mobile and what Zimperium is doing to limit risks.