mobile security - News, Features, and Slideshows

Features

  • With Android L, Google makes pitch for enterprise users

    Google will provide enterprise-focused security and management features to its entire Android showcase of mobile devices, including features reserved only for Samsung devices running Samsung security software called Knox, a Google executive announced during the Google I/O keynote address Wednesday.

    Written by Matt Hamblen26 June 14 06:59
  • The Open Source Rookies of the Year Awards

    , the open source software management company, picks the top 10 open source projects launched in the past year, based on stats collected from the

    Written by Black Duck28 Jan. 14 14:08
  • Mobile attacks top the list of 2013 security threats

    For years, information security experts have predicted a spike in mobile malware. Will 2013 be the year of mobile attacks? And what other security threats are on the horizon?

    Written by Thor Olavsrud09 Jan. 13 14:25
  • When in China, don't leave your laptop alone

    If you travel to China or Russia, assume government or industry spooks will steal your data and install spyware. Here's how to thwart them

    Written by Bob Violino04 Dec. 12 11:11
  • Passwords are the weak link in IT security

    Three decades into the digital revolution, passwords are still complicated, ineffective and a drain on IT's resources. What gives?

    Written by Howard Baldwin05 Nov. 12 11:16
  • Apple iOS: Why it's the most secure OS, period

    In June 2007, Apple released the iPhone, and the device quickly took off to become a major brand in the smartphone market. Yet when the iPhone shipped, security on the mobile operating system was nearly nonexistent. Missing from the initial iOS (then called iPhone OS) were many of the security features that modern-day desktop software has as a matter of course, such as data-execution protection (DEP) and address-space layout randomization (ASLR). Apple's cachet lured security researchers to test the platform, and in less than a month, a trio had released details on the first vulnerability: an exploitable flaw in the mobile Safari browser.

    Written by Robert Lemos06 June 11 20:04
  • Steps to secure your smartphone against data theft

    You may already know the basics of Internet security and keeping your personal data private while browsing the Web: Use a firewall, don't open attachments you aren't expecting, and never follow links from strangers. But what about your smartphone? The ease with which security researcher Georgia Weidman was able to infect Android phones with her custom botnet during the 2011 ShmooCon security conference suggests that anyone concerned about the privacy of the personal data stored on their smartphone should think twice before downloading dubious or otherwise untrustworthy apps.

    Written by Alex Wawro05 March 11 11:04
  • Steps for achieving proper mobile security governance

    Advanced mobile devices--iPhone, BlackBerry and other handhelds--have created a growing wireless mobility environment for business, personal communication and entertainment. However, their growing use has also led to a faster increase in the depth and breadth of mobile security threats. Using a mobile device to access corporate information systems can potentially create a hole to corporate security if not protected and used properly. In a recent report from CSI, the theft or loss of corporate proprietary and customer information by mobile devices is nearly half of all sources. <a href="http://www.csoonline.com/article/217082">Data breaches</a> are real to nearly every organization of virtually any size, from the big multinational corporation to the small to medium business, including device loss, theft, misuse, and unauthorized access to corporate network and data disclosure.

    Written by Robert Zhang28 May 09 07:06
[]