Mobile Security

Mobile security news, trends, analysis and practical advice

security encryption key
Bionym Nymi in colors

how and why to use app specific passwords with icloud

How (and why) to use app-specific passwords with iCloud

Apple's security systems steal another advantage against rivals today as the company finally enables app-specific passwords to help improve the level of protection its customers enjoy.

Android mobile security

Android SMS worm Selfmite is back, more aggressive than ever

A new version of the Android worm Selfmite has the potential to ramp up huge SMS charges for victims as it tries to spread to as many devices as possible.

Apple iOS 8 on iPhone

Four-digit passcodes are a weak point in iOS 8 data encryption

The strength of Apple's revised encryption scheme in iOS 8 hinges on users choosing a strong passcode or password, something they rarely do.

45% of Android devices still have a vulnerable browser installed

Almost half of all Android devices have a browser that is vulnerable to two serious security issues, according to data from mobile security firm Lookout.

Angry Birds Transformers Trojan warns Obey or be hacked

Angry Birds Transformers Trojan targets Android, warns ‘Obey or be hacked’

The new Angry Birds Transformers game officially launches this month, but it's already been targeted by a Trojan spotted in the wild that wipes the memory card, blocks messenger apps, and spams contacts every five seconds with the...

apple has just about killed the iphone crime wave2

Apple has just about killed the iPhone crime wave

Apple has not only cut iPhone crime, but has managed to reduce the black market value of stolen iPhones.

Apple iOS 8 on the iPhone

iPhone 6 fingerprint scanner found to be accurate enough for Apple Pay

Apple's iPhone 6 fingerprint scanner has a level of accuracy that makes it a solid authentication tool for people planning to use the smartphone in place of a credit card for in-store purchases, research shows.


Apple outsmarts the thieves

The Apple Pay approach to mobile payment turns the security conundrum upside down by keeping data out of thief-magnet servers.


We just might put a dent in data breaches

New developments in payment technology could show the way to keep credit card data away from the prying eyes of cyberthieves.

Samsung drops Knox prices and introduces Knox user portal

Samsung announced price reductions and updates for its Knox security and management software for IT shops and a free My Knox service that is directly available to professionals using ActiveSync.

thoughts on apple tim cook and privacy

Thoughts on Apple, Tim Cook and privacy

While Apple CEO, Tim Cook, is "offended" at the way customer privacy is being undermined by some tech firms, you should be frightened...

Samsung flexes enterprise muscles with Tab Active and Knox

Samsung promoted enterprise uses for its upcoming Galaxy Tab Active rugged tablet, its Knox security and management software, and even its Gear VR headset at its recent Super Mobility Week event.

android malware

Many Android devices vulnerable to session hijacking through the default browser

The default browser in Android versions older than 4.4 has a vulnerability that allows malicious websites to bypass a critical security mechanism and take control of a user's authenticated sessions on other sites.

byod security

Is a Remote-Wipe Policy a Crude Approach to BYOD Security?

While the capability to remotely wipe data from lost or stolen mobile phones may help CIOs sleep at night, it may be an outdated approach to BYOD security.

Not exactly Law & Order: IT Victims Unit

Flashback to 1994, when laptops cost $3,000 and are hard to come by at the company where this pilot fish works -- a situation that doesn't improve when the lone loaner laptop goes missing.

young man talking on a mobile phone

‘Can everyone hear me now?’

Voice interception of mobile calls is an invisible security hole that isn’t getting enough attention.

mobile security

Popular Android apps fail basic security tests, putting privacy at risk

Instagram, Grindr, OkCupid and many other Android apps fail to take basic precautions to protect their users' data, putting their privacy at risk, according to new study.

Surveillance tech

Are your calls being intercepted? 17 fake cell towers discovered in one month

CryptoPhone users found 17 fake “cell towers” in a month, but don’t know who deployed them or why. Most phones don’t show any signs that they are a target of stingray surveillance, such as when users’ calls are recorded, texts spoofed...

Load More