Mobile Security

Mobile security news, trends, analysis and practical advice

arrest
pleasepayfirst

Apple iOS 8 on the iPhone

iPhone 6 fingerprint scanner found to be accurate enough for Apple Pay

Apple's iPhone 6 fingerprint scanner has a level of accuracy that makes it a solid authentication tool for people planning to use the smartphone in place of a credit card for in-store purchases, research shows.

Samsung drops Knox prices and introduces Knox user portal

Samsung announced price reductions and updates for its Knox security and management software for IT shops and a free My Knox service that is directly available to professionals using ActiveSync.

byod security

Is a Remote-Wipe Policy a Crude Approach to BYOD Security?

While the capability to remotely wipe data from lost or stolen mobile phones may help CIOs sleep at night, it may be an outdated approach to BYOD security.

thoughts on apple tim cook and privacy

Thoughts on Apple, Tim Cook and privacy

While Apple CEO, Tim Cook, is "offended" at the way customer privacy is being undermined by some tech firms, you should be frightened...

Samsung flexes enterprise muscles with Tab Active and Knox

Samsung promoted enterprise uses for its upcoming Galaxy Tab Active rugged tablet, its Knox security and management software, and even its Gear VR headset at its recent Super Mobility Week event.

android malware

Many Android devices vulnerable to session hijacking through the default browser

The default browser in Android versions older than 4.4 has a vulnerability that allows malicious websites to bypass a critical security mechanism and take control of a user's authenticated sessions on other sites.

Not exactly Law & Order: IT Victims Unit

Flashback to 1994, when laptops cost $3,000 and are hard to come by at the company where this pilot fish works -- a situation that doesn't improve when the lone loaner laptop goes missing.

young man talking on a mobile phone

‘Can everyone hear me now?’

Voice interception of mobile calls is an invisible security hole that isn’t getting enough attention.

mobile security

Popular Android apps fail basic security tests, putting privacy at risk

Instagram, Grindr, OkCupid and many other Android apps fail to take basic precautions to protect their users' data, putting their privacy at risk, according to new study.

scarlett johansson naked selfie 2

Naked celebs: Hackers download sext selfies from iCloud

Scarlett Johansson, Jennifer Lawrence, Kate Upton... the sad list of naked celebs goes on. But what's Apple doing about it? ICYMI, hackers have downloaded celebrities' sexting pictures: It seems the victims' iCloud passwords were...

Surveillance tech

Are your calls being intercepted? 17 fake cell towers discovered in one month

CryptoPhone users found 17 fake “cell towers” in a month, but don’t know who deployed them or why. Most phones don’t show any signs that they are a target of stingray surveillance, such as when users’ calls are recorded, texts spoofed...

New attacks secretly use smartphone cameras, speakers and microphones

Do you regard your smartphone cameras and speakers as a security threat? You might after checking out presentations from the 8th USENIX Workshop on Offensive Technologies (WOOT). If you were a target, you would neither see, nor...

The biggest iPhone security risk could be connecting one to a computer

Apple has done well to insulate its iOS mobile operating system from many security issues, but a forthcoming demonstration shows it's far from perfect.

BlackBerry patches vulnerabilities in BlackBerry OS, enterprise server software

BlackBerry's focus on strong security as a key differentiator for its devices does not mean that they're completely free of flaws. The company released security updates Tuesday for both the OS running on its smartphones and for its...

Financial firms not offering two factor authentication

A recent article in the New York Times may, hopefully, shame financial firms into increasing their online security. The article, A Two-Step Plan to Stop Hackers by Ron Lieber is about two factor authentication (2FA), a system we...

Consumer Reports drops the ball on airport Wi-Fi

The September 2014 issue of Consumer Reports has one of their most disappointing articles. It's called "Free Wi-Fi takes off at airports" and is on page 10 (it's not available online). The article is a huge opportunity missed....

Black Hat talk exposes how easily criminals can hack mobile broadband modems

A Black Hat USA talk exposed how easily criminals can exploit vulnerabilities and built-in functionalities in mobile broadband modems. An attacker can remotely control a target’s Internet traffic, use the built-in SMS functionality to...

Carriers' remote control software still puts mobile devices at risk

Vulnerabilities found in remote management software that carriers insist be installed on smart phones and other mobile-enabled devices they sell are likely to put many devices at risk of compromise for some time to come.

Load More