dcsimg

Mobile Security - Article Archives - Page 6

Shevirah Moving Forward for Enterprise Mobile Pen Testing [VIDEO]

December 08, 2015 |

Security innovator Georgia Weidman discusses what her new startup is doing to help enterprise mobile security.

READ MORE

Only 28 Percent of Consumers Are Fully Confident in Mobile Device Security

December 01, 2015 |

Still, 32 percent use their mobile devices to send work-related emails, a recent study found.

READ MORE

Can Mobile Apps Defend Themselves? Yes, Says Bluebox

November 23, 2015 |

Bluebox's approach goes beyond providing just a security wrapper for mobile applications.

READ MORE

Is Jailbreaking Apple Devices Always a No-No?

November 20, 2015 |

Apple and enterprise IT teams discourage jailbreaking Apple devices – and with good reason. But is jailbreaking always a bad thing?

READ MORE

All about Authentication, Apps for Nymi

November 17, 2015 |

Canadian startup Nymi is building a developer ecosystem for its biometric authentication technology.

READ MORE

Android Tablets Sold on Amazon Infected with Cloudsota Trojan

November 16, 2015 |

The tablets have been sold and delivered to over 17,000 customers in more than 150 countries.

READ MORE

Ransomware Is Now the Leading Mobile Malware Threat

November 04, 2015 |

And porn sites are now the top mobile infection vector, according to Blue Coat.

READ MORE

Top 20 Android Security Apps

October 27, 2015 |

While it used to be necessary to deploy an anti-virus app along with a separate anti-theft app and perhaps an individual app locker, most Android security solutions now include all of that functionality in a single app. This list includes mostly broad-based Android security solutions, along with one dedicated anti-theft app and three password management options.

READ MORE

48 Percent of Used Hard Drives Sold Online Contain Residual Data

October 12, 2015 |

The same is true of 35 percent of used mobile devices, according to a recent study.

READ MORE

Unlocking Smartphones: PINs, Patterns or Fingerprints?

October 08, 2015 |

PINs, patterns and fingerprints are all options for unlocking mobile devices. But which option is most secure?

READ MORE

Apple Watch Security Risks (and Benefits)

September 28, 2015 |

With the Apple Watch, as with smartphones before it, security pros need to proactively prepare for the mobile device's entry into the workplace.

READ MORE

38 Percent of IT Security Pros Don't Participate in Their Own BYOD Programs

September 28, 2015 |

And 28 percent of enterprises do nothing at all about mobile security, a recent Bitglass survey found.

READ MORE

87 Percent of Business, IT Pros Expect Mobile Payments Breaches to Grow

September 25, 2015 |

But 42 percent have used mobile payments this year regardless of the risks, a recent ISACA survey found.

READ MORE

Millions Infected by Malware in Apple App Store

September 22, 2015 |

The malware is capable of launching phishing attacks and stealing data from the user's clipboard.

READ MORE

How to Fight Zombie App-ocalypse

September 16, 2015 |

"Zombie" apps are an often overlooked BYOD security threat. User education and application whitelisting can reduce risks associated with these dead and stale apps.

READ MORE

Using Two-Factor Authentication for Mobile Security

September 14, 2015 |

Reduce the likelihood of having your mobile device hacked by using two-factor authentication.

READ MORE

225,000 Apple Credentials Stolen via New iOS Malware

September 01, 2015 |

It's the 'largest known Apple account theft caused by malware,' according to Palo Alto Networks researchers.

READ MORE

Apple vs. Android: Mobile Security Pros and Cons

August 31, 2015 |

Both Apple's iOS and Android have security strengths and weaknesses, experts say.

READ MORE

10 Free or Cheap WiFi Security Testing Tools

August 26, 2015 |

Do not kid yourselves, security professionals. You need more than one WiFi security testing tool. Here are 10 free or inexpensive options.

READ MORE

Certifigate Flaw Exposes Android Users to Risk [VIDEO]

August 07, 2015 |

Remote diagnostic tools from OEMs that are supposed to help Android users, could instead be used to hurt them.

READ MORE