Mobile Security

Mobile security news, trends, analysis and practical advice

FCC mobile phones FTC security
CSO password management survival guide


Why passwords fail end users

At the 2016 Interop show, Network World got a quick demo of Keeper Security's password management and vault app. The company's CEO, Darren Guccione, also explained why most password methods fail end users, and whether biometrics...

A paranoid user with a laptop computer looks around suspiciously. [credit: Thinkstock]

5 secure habits of the paranoid PC user

Are you getting a little sloppy with your security? Time to shape up. Practice these five habits to protect your data at home, in the office and out in the world.

Android Apps Fingerprint Support

16 standout Android apps with fingerprint support

Take full advantage of your phone's fingerprint sensor with these genuinely useful fingerprint-ready apps.

iPhone fingerprint

FBI uses 5th-Amendment loophole to unlock iPhone of Bkhchadzhyan

iPhone owner ordered by judge to give FBI the finger -- to unlock her iPhone with her fingerprint, that is. The feds think Paytsar Bkhchadzhyan's shiny hides evidence of criminality. But hold on there, buddy -- surely the 5th...

ransom note

Malvertising attack infects old Android devices with ransomware

Attackers are using two known exploits to silently install ransomware on older Android devices when their owners browse to websites that load malicious advertisements.

hacked computer security symbol   hacked rot

Hackers only need your phone number to eavesdrop on calls, read texts, track you

Thanks to a flaw in the cellular network SS7 protocol, an attacker just needs your phone number to listen to your calls, read your texts and track you. 60 Minutes showed how hackers only needed a congressman's phone number to record...

online security

5 things you should know about two-factor authentication

One of the best pieces of security advice any computer expert can give you is to enable two-factor authentication for websites that support it. With password breaches so common, it could be the one thing that keeps hackers from...

mobile security

One-fifth of IT pros say their companies had mobile data breach

IT pros have long been concerned about the potential for security breaches with BOYD; a new survey indicates they're right to be worried.

can apple get things back under control

Can Apple get things back under control?

Easter has not been a happy holiday for Apple.

14 privacy and security settings every ios user should understand

14 privacy and security settings every iOS user should use

A growing horde of snoopers want access to your digital life, protect yourself by using existing security and privacy settings.

cso50 winners

CSO50 2016 winners announced

The CSO50 recognizes 50 security projects, taken on by 45 organizations, that demonstrate outstanding thought leadership and business value. These are their stories.

hp elite x3 dock (Embargo to noon ET 2/21/2016)

HP offers Windows 10 smartphone with fingerprint and iris recognition security (+video)

HP targeted security-conscious business users and IT with its announcement of the Elite x3 smartphone that runs Windows 10 Mobile. It ships this summer.

iphone security stock

Apple's fight with the FBI could lead to a password arms race

A U.S. magistrate's order requiring Apple to assist the FBI in unlocking a dead mass shooter's iPhone could lead device makers to require stronger passwords in future.

Android Malware Monster

The Android malware monster will never die

But here's the dirty little secret security software vendors don't want you to know: There's really no reason to be scared.


Why the “s” in HTTPs is important

Using secure HTTP is especially important when using wireless in a public place.

apps and data representations being erased from a chalkboard

Containerization moves beyond the full erase

The latest containerization technologies enable IT to create separate, protected areas for work apps and data on employees' personal devices. The challenge is to maintain security.

fraud infog primary

2015: The year in security, identify theft and fraud

There’s a lot we can say about cybersecurity, identify theft and fraud in 2015, but we’re going to let our infographic tell the story.

Lorenz machine

The 411 on encryption

News articles and political speeches are full of references to encryption, to "back-doors" and "golden keys." The NSA spying scandal exposed by Edward Snowden thrust the concept of personal privacy into the spotlight, and along with...

Load More