Mobile

Full Disk Encryption Buyer’s Guide

Full disk encryption - also known as whole encryption - is the most effective way to prevent confidential data being taken from a laptop that has been lost, stolen or left ...

Researchers Warn of Malware in Fake Instagram App for Android

Security researchers from Trend Micro and Sophos recently uncovered malicious versions of the popular Instagram app for Android. The malware is identified by Sophos as Andr/Boxer-F, and by Trend Mic...

4 Steps to Securing Mobile Devices and Apps in the Workplace

It's an unstoppable trend: Employees are bringing their own iPhones, iPads, and Android devices to work and using them for business purposes. While that may be great for pr...

Google Wallet Compromised with Hackers Access to PIN & Funds

What would happen if you lost your wallet to a thief? It's a question that Google Wallet users on Android phones are asking themselves in the wake of multiple reports of sec...

Google Wallet Hacked

The Smartphone Champ has revealed a simple hack that can provide access to all of the funds of a Google Wallet user -- it's far easier than a method of cracking the Google W...

Exploit of Wi-Fi Protected Setup Flaw Poses Risks for Consumers, Not Enterprises

There is a price that comes with simplicity -- and when it comes to security, that price is often increased risk. That's exactly what is now happening with Wi-Fi Protected Setup (WPS), which is inte...

BlackBerry PlayBook Hacked

A group of researchers claims to have jailbroken the BlackBerry PlayBook."In a video demonstration of the jailbreak, one of the researchers shows off the ability to change th...

iOS vs Android Security: Which One Is More Secure?

Just when you thought the evidence was dramatic -- overwhelming perhaps -- that Apple's iOS offers vastly more mobile security than does Google's Android, the wall of confid...

8 iOS Security Apps for Jailbroken Devices

Due to the iOS design, there are a limited number of security apps in the Mac App Store. However, jailbreaking your iPhone, iPad, or iPod Touch gives apps more control of i...

Tools to Deploy 802.1X on Mobile Devices

Deploying WPA2-Enterprise security with 802.1X authentication across your Wi-Fi network of PCs is already quite a task. Adding in support of all the mobile phones and tablets makes it even more daun...

Latest articles