Mobile Security

Mobile Security news, analysis, research, how-to, opinion, and video.


salted hash thumbnail final
video

Managing open-source mobile security and privacy for activists worldwide | Salted Hash Ep 18

Nathan Freitas, who heads The Guardian Project, talks with host Steve Ragan and senior writer J.M. Porup about the group's easy-to-use secure apps, open-source software libraries, and customized mobile devices being used around the...

wi fi router

5 Ways to Secure Wi-Fi Networks

Tips about Wi-Fi security because wireless is inherently less secure.

Wi-Fi tools

Guest Wi-Fi access should always be ‘easy, peasy’

Guest Wi-Fi is a critical component of the digital experience for many companies. Follow these tips to ensure access to yours is a simple and secure—and doesn’t frustrate users.

nordvpn

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN has discounted their popular VPN software 72%. Use our link and see the discount applied when you click "buy now".

black man phone cafe upset

Users have little confidence their company can protect their mobile device

A survey sponsored by Check Point found that 64 percent of respondents are doubtful that their organization can prevent a mobile cyberattack. What can be done to combat that?

mastercard fingerprint sensor

MasterCard puts a finger on fraud

MasterCard introduces a new credit card that has a fingerprint sensor.

securiy companies watch

Cybersecurity companies to watch

CBInsights created a list of startups that its metrics showed has early-to mid-stage high-momentum companies pioneering technology with the potential to transform cybersecurity. 

How to prevent your mobile app from getting hacked

TriviaCrack may be addicting to users, but criminals are hooked on getting your personal information from other apps you use

170301 mwc 03260

Samsung taps DOD tech veteran to head enterprise push

Samsung Electronics has appointed the former CIO of the Department of Defense to help a global push to expand its mobile enterprise business.

smarthub

What home products are most susceptible to cyber burglars?

In the matter of the Dyn situation, it was those Internet of Things devices that created the voluminous distributed denial of sevice attack. A DVR was used to attack Dyn’s network. To reduce the impact of such attacks, officials at...

wearables and security primary2

10 things you need to know about the security risks of wearables

Fitness trackers may not present a huge security risk, but any connected device can be hacked. Here’s what you need to know to minimize those security and privacy threats.

information security threat primary4

9 biggest information security threats through 2019

Each year, the Information Security Forum, a nonprofit association that researches and analyzes security and risk management issues, releases its 'Threat Horizon' report to provide a forward-looking view of the biggest security...

mobile threat chart

Malware infection rate of smartphones is soaring – Android devices often the target

Smartphones are by far the most popular target of mobile malware, and the infection rate is soaring, according to new research by Nokia.

old pcs computers desktops trash recycle

Study finds devices are not wiped properly

The National Association for Information Destruction (NAID) found in a recent study that 40 percent of the devices that bought from secondhand markets had PII on them.

android security

Most Android devices lack latest security patches

Nearly three-quarters of Android devices on the five biggest U.S. carriers are running on security patches that are at least two months old, putting them at greater risk of being hacked.

burlap money bag

Enterprises misaligning security budget, priorities

Those on staff who are doing the budgeting might blindly write the same amount into the security line every year. Or the C-suite might handcuff the security personnel with a tight budget that doesn’t allow for expansion into new...

smartphone security

Acoustic attack lets hackers control smartphone sensor

The acoustic injection attack takes advantage of a newfound vulnerability in smartphones and lets hackers remotely control the devices.

01 intro byod

What to consider in developing BYOD policy

In today’s work environment, employees are increasingly expected to be constantly available and communicating. Regardless of whether the company permits it, employees will use their personal devices for work. Instead of ignoring the...

Load More