Mobile

5 Tips on Using OAuth 2.0 for Secure Authorization

By Aleksey Gavrilenko, ItransitionApproaches to security issues change constantly, along with evolving threats. One approach is to implement OAuth, an open authorization st...

Mobile Authentication vs. Biometrics

By Henrik Jeberg, SMS PASSCODEIn today's business world the use of remote access to support a distributed workforce has become not only commonplace but imperative. Having th...

Best iPhone Security Apps

While Apple blocks full anti-virus apps from its App Store, counting on its own technology and systems to protect its users (in a whitepaper , the company states, "Every iOS device ...

What are the Benefits & Risks of Jailbreaking Your iPhone?

While Apple strongly discourages jailbreaking its devices, some users do it anyway to get access to operating system enhancements or tweaks not available through Apple.Jailb...

All about Authentication, Apps for Nymi

Kind of like a Ferrari without an engine, cool devices like smartwatches get boring pretty quickly without compelling apps to drive the user experience.That is why Canadian startup Nymi sells a soft...

Android Tablets Sold on Amazon Infected with Cloudsota Trojan

Researchers at Cheetah Mobile recently found a Trojan called Cloudsota pre-installed on some Android tablets that were available for sale on Amazon.com and other online sto...

Best Security App for Android in 2022

As Android devices continue to surge in popularity, the recently disclosed Stagefright vulnerability, affecting 950 million devices, served as a strong reminder of how crucial it is...

Unlocking Smartphones: PINs, Patterns or Fingerprints?

Losing your smartphone can result in a catastrophic security breach. After all, these devices are potential treasure troves of confidential corporate and personal informati...

Apple Watch Security Risks (and Benefits)

The Apple Watch is arriving in the enterprise in increasing numbers, and it’s here to stay. According to a recent 451 Research survey of Apple Watch owners, 87 percent of res...

Millions Infected by Malware in Apple App Store

Palo Alto Networks researchers recently warned of new OS X and iOS malware called XcodeGhost, which has been repackaged into some versions of Xcode installers, which were then uploaded to file shari...

Latest articles