Mobile Security - Article Archives - Page 3

Devices Running Insecure Software: Study

February 24, 2016 |

Study of two million devices reveals that more than half are running outdated, vulnerable software.

READ MORE

10 Trickiest Mobile Security Threats

February 18, 2016 |

Mobile apps are popular with knowledge workers and hackers alike. Which 10 mobile security threats are the most problematic for security pros?

READ MORE

Mobile Authentication vs. Biometrics

February 16, 2016 |

Biometrics and multi-factor authentication are two approaches to remotely accessing enterprise systems via mobile devices. Which is right for you?

READ MORE

10 Apps to Improve iPhone Security

January 25, 2016 |

Apps like these improve the security of iOS devices like iPhones.

READ MORE

Carrier Pre-Loads Expand Keeper's Mobile Password Footprint

January 14, 2016 |

Mobile password manager app continues to expand user base, thanks to new carrier partnerships.

READ MORE

6 Mobile Security Predictions for 2016

January 06, 2016 |

Big changes for mobile security are ahead in 2016, predict mobile security experts.

READ MORE

Startup Spotlight: Bluebox Security's Mobile App Security

December 10, 2015 |

Bluebox Security's platform boosts mobile app security without making extra work for developers.

READ MORE

Shevirah Moving Forward for Enterprise Mobile Pen Testing [VIDEO]

December 08, 2015 |

Security innovator Georgia Weidman discusses what her new startup is doing to help enterprise mobile security.

READ MORE

Only 28 Percent of Consumers Are Fully Confident in Mobile Device Security

December 01, 2015 |

Still, 32 percent use their mobile devices to send work-related emails, a recent study found.

READ MORE

Can Mobile Apps Defend Themselves? Yes, Says Bluebox

November 23, 2015 |

Bluebox's approach goes beyond providing just a security wrapper for mobile applications.

READ MORE

Is Jailbreaking Apple Devices Always a No-No?

November 20, 2015 |

Apple and enterprise IT teams discourage jailbreaking Apple devices – and with good reason. But is jailbreaking always a bad thing?

READ MORE

All about Authentication, Apps for Nymi

November 17, 2015 |

Canadian startup Nymi is building a developer ecosystem for its biometric authentication technology.

READ MORE

Android Tablets Sold on Amazon Infected with Cloudsota Trojan

November 16, 2015 |

The tablets have been sold and delivered to over 17,000 customers in more than 150 countries.

READ MORE

Ransomware Is Now the Leading Mobile Malware Threat

November 04, 2015 |

And porn sites are now the top mobile infection vector, according to Blue Coat.

READ MORE

Top 20 Android Security Apps

October 27, 2015 |

While it used to be necessary to deploy an anti-virus app along with a separate anti-theft app and perhaps an individual app locker, most Android security solutions now include all of that functionality in a single app. This list includes mostly broad-based Android security solutions, along with one dedicated anti-theft app and three password management options.

READ MORE

48 Percent of Used Hard Drives Sold Online Contain Residual Data

October 12, 2015 |

The same is true of 35 percent of used mobile devices, according to a recent study.

READ MORE

Unlocking Smartphones: PINs, Patterns or Fingerprints?

October 08, 2015 |

PINs, patterns and fingerprints are all options for unlocking mobile devices. But which option is most secure?

READ MORE

Apple Watch Security Risks (and Benefits)

September 28, 2015 |

With the Apple Watch, as with smartphones before it, security pros need to proactively prepare for the mobile device's entry into the workplace.

READ MORE

38 Percent of IT Security Pros Don't Participate in Their Own BYOD Programs

September 28, 2015 |

And 28 percent of enterprises do nothing at all about mobile security, a recent Bitglass survey found.

READ MORE

87 Percent of Business, IT Pros Expect Mobile Payments Breaches to Grow

September 25, 2015 |

But 42 percent have used mobile payments this year regardless of the risks, a recent ISACA survey found.

READ MORE