Mobile Security

Mobile security news, trends, analysis and practical advice

internet of things smart house
Talent Acquisition Methods

Sundar Pichai

Google’s Sundar Pichai has been hacked; which CEO will be next?

Google CEO Sundar Pichai has become the latest tech executive to have a social media account hacked.

4 mastercard

MasterCard joins Visa in streamlining chip card processing

MasterCard announced plans similar to those made last week by Visa to speed up chip card in-store terminal testing and certification.

broken link breaching weakest link connection vulnerability 000004213740

AT&T and Samsung detail security gaps

In a global online survey of 800 enterprises conducted by IDC for AT&T, 60% said they had a security breach in 2015. Of that group, 42% said the breach had a significant negative impact on the business.

biometrics

Forget fingerprints; Iris scans could validate mobile payments

Newer biometrics technologies beyond the use of fingerprint scans could boost adoption rates for mobile payments.

school food chicken nuggets tray lunch school lunch food 000000723036

Hackers are ready to eat your app for LUNCH

These are some classic characteristics and traits of development teams that can signal trouble when it comes to building highly secure applications and services.

01 intro

7 ways to prevent mobile break-in

As mobile devices continue to penetrate our society, mobile security is becoming increasingly difficult to manage. Every mobile device we own, whether it’s a phone or a tablet, provides hackers with a new avenue to seize private...

insider threat

Review: New tools to fight insider threats

An entire industry has sprung up to provide a defense against insider threats. We tested products from Fortscale, Avanan, and PFU Systems, with each one concentrating on a different aspect of the problem.

FCC mobile phones FTC security

Obama agencies fight phone firms in vuln fix fails

Federales probing slow security by mobile phone carriers and ODMs. The FCC and FTC are tag-teaming to investigate non-existent or long-delayed OTA updates -- even when it's critical security vulnerabilities they patch...

CSO password management survival guide

The CSO password management survival guide

It's time to take the password problem in hand. This free guide from the editors of CSO will help you communicate the challenges and what is at stake and evaluate and choose the right enterprise password management solution for your...

video

Why passwords fail end users

At the 2016 Interop show, Network World got a quick demo of Keeper Security's password management and vault app. The company's CEO, Darren Guccione, also explained why most password methods fail end users, and whether biometrics...

A paranoid user with a laptop computer looks around suspiciously. [credit: Thinkstock]

5 secure habits of the paranoid PC user

Are you getting a little sloppy with your security? Time to shape up. Practice these five habits to protect your data at home, in the office and out in the world.

Android Apps Fingerprint Support

16 standout Android apps with fingerprint support

Take full advantage of your phone's fingerprint sensor with these genuinely useful fingerprint-ready apps.

iPhone fingerprint

FBI uses 5th-Amendment loophole to unlock iPhone of Bkhchadzhyan

iPhone owner ordered by judge to give FBI the finger -- to unlock her iPhone with her fingerprint, that is. The feds think Paytsar Bkhchadzhyan's shiny hides evidence of criminality. But hold on there, buddy -- surely the 5th...

ransom note

Malvertising attack infects old Android devices with ransomware

Attackers are using two known exploits to silently install ransomware on older Android devices when their owners browse to websites that load malicious advertisements.

hacked computer security symbol   hacked rot

Hackers only need your phone number to eavesdrop on calls, read texts, track you

Thanks to a flaw in the cellular network SS7 protocol, an attacker just needs your phone number to listen to your calls, read your texts and track you. 60 Minutes showed how hackers only needed a congressman's phone number to record...

online security

5 things you should know about two-factor authentication

One of the best pieces of security advice any computer expert can give you is to enable two-factor authentication for websites that support it. With password breaches so common, it could be the one thing that keeps hackers from...

mobile security

One-fifth of IT pros say their companies had mobile data breach

IT pros have long been concerned about the potential for security breaches with BOYD; a new survey indicates they're right to be worried.

can apple get things back under control

Can Apple get things back under control?

Easter has not been a happy holiday for Apple.

Load More