Mobile Security

Mobile security news, trends, analysis and practical advice

Take back your vacation with the help of Outlook's Automatic Replies
nordvpn

android security

Most Android devices lack latest security patches

Nearly three-quarters of Android devices on the five biggest U.S. carriers are running on security patches that are at least two months old, putting them at greater risk of being hacked.

p1200736

Google cites progress in Android security, but patching issues linger

The chances of you installing malware on your Android phone is incredibly small, according to Google.

secusuite for samsung knox 1

BlackBerry preps a more secure Samsung Galaxy S7

Secusmart, the BlackBerry subsidiary that secures the German Chancellor Angela Merkel's smartphone, will roll out a version of its SecuSuite security software compatible with Samsung Electronics' Knox platform later this year.

20160225 stock mwc ericsson booth security locks

How much are vendor security assurances worth after the CIA leaks?

Google, Apple, Microsoft and other software vendors are working to identify and patch the vulnerabilities described in the CIA leak, but ultimately this doesn't change the status quo of software security.

cog systems d4 secure htc a9 ip address

By virtualizing the Android OS, Cog Systems says it adds more security to smartphones

It sounds like a smartphone user's worst fear: Software that starts up before the phone's operating system, intercepting and encrypting every byte sent to or from the flash memory or the network interface. This is not some new kind of...

security light

25% off Kuna Smart Home Security Outdoor Light & Camera - Deal Alert

Night or day, Kuna’s smart outdoor security camera system detects movement at your door and sends actionable alerts to your mobile device, allowing you to safely take action using Kuna’s lights, HD live video feed, two-way intercom,...

security code big data cyberespionage DDoS

Windows Trojan hacks into embedded devices to install Mirai

Attackers have started to use Windows and Android malware to hack into embedded devices, dispelling the belief that if such devices are not directly exposed to the Internet they're less vulnerable.

01 workforce

7 musts for any successful BYOD program

Mobile devices, mobile apps and the networks they use are now essential to satisfy customers, collaborate more effectively with suppliers, and keep employees productive anytime and anywhere.

BlackBerry

BlackBerry offers secure mobile communications platform for developers

BlackBerry announced a new line of business to provide developers with a secure, cloud-based, mobile communications platform for texting, voice, video and file sharing.

01 workforce

7 musts for any successful BYOD program

Mobile devices, mobile apps and the networks they use are now essential to satisfy customers, collaborate more effectively with suppliers, and keep employees productive anytime and anywhere.

credit card fraud

Online card fraud up as thieves avoid more secure chip cards for in-store payments

Deterred by more secure chip cards for in-store payments, thieves have resorted to stealing credit-card numbers and passwords or opening new accounts with false credentials to use in making online payments for purchases, according to...

free wi fi thinkstock

Stay safe on your Android phone while using free public Wi-Fi

A few simple steps will go a long way towards improved security when you use public WiFi on your Android phone.

170104 blackberry 2

TCL targets Apple, Samsung with new BlackBerry handset

For a brand that's been written off by many, TCL Communication has big plans for BlackBerry.

iot security

BlackBerry unveils BlackBerry Secure for enterprise IoT mobile security

BlackBerry touted a comprehensive mobile-security platform for a variety of IoT devices connected to enterprises

thieving magpie

U.S. and U.K. spy agencies have intercepted in-flight phone calls for years

U.S. and U.K. spy agencies have been monitoring in-flight mobile phone users for years, according to new revelations from the trove of documents leaked by former NSA contractor Edward Snowden.

fingerprint

Feds: It's legal to demand fingerprints to unlock phones of everyone in a building

Federal prosecutors wanted cops to collect fingerprints and thumbprints of everyone in a building to unlock all smartphones at that location.

glass office cloud

Business transformation proves to be catalyst for cybersecurity spending

Evolving risks and business technologies shift focus in security budgets

00 intro

10 ways to secure a mobile workforce

As much as you might want to implement all the latest best practices and lock down your company like Fort Knox, you need to align your policies to your company culture.

Load More