Mobile device security News
August 17, 2017
IOS 11 will allow users to avoid authorities attempting to force smartphone access by temporarily disabling biometric unlocking of mobile devices.
July 31, 2017
IT experts have confidence in the security of iOS devices, but there are vulnerabilities to watch out for. Users often avoid passcodes, for instance.
July 28, 2017
At Black Hat 2017, Exodus Intelligence researcher Nitay Artenstein unveiled the Broadpwn exploit, which he called the world's first Wi-Fi worm and which puts billions of iOS and Android devices at risk.
May 19, 2017
News roundup: The new Google Play Protect system aims to improve Android app security. Plus, Google Cloud IoT Core adds layer of device security, and more.
Mobile device security Get Started
Bring yourself up to speed with our introductory content
Ever since the first mobile device hit the enterprise network, best endpoint security practices have been a major IT concern. What's happened since then has been a staggering proliferation of the number and types of devices on the network, complicated by increasing numbers of mobile and remote corporate employees, all of which have essentially ended the traditional idea of a corporate network security perimeter. Firewalls and other more traditional security appliances may still be in use, and rightly so, but endpoint security management is more critical than ever in keeping enterprise systems and data safe from malicious actors.
The summer Insider Edition, our Information Security magazine quarterly e-zine, looks at what's new in endpoint security management, from the best endpoint security tools to consider now, and what other efforts beyond tools infosec pros can employ to best secure all those pesky mobile endpoints wandering in and out of corporate corridors.
This Insider Edition offers expert assessments on the endpoint security technology vendors have developed to combat mutating ransomware like WannaCry -- from machine learning to multivendor partnerships to behavior analytics. Also included is an exploration of mobile endpoint security tools like application containers and app wrapping. CISOs must focus now on how the threats, and the technological advances to fight them, are changing and factor these considerations into any endpoint security strategy.
Readers will come away with a deeper understanding of the best endpoint security tools and techniques available and be able to consider the most advanced approaches available to locking down the company data and systems that endpoints can access.Continue Reading
Managing mobile devices just keeps getting harder. Devices and apps are proliferating. Every data breach seems to prompt new rules. We lay out the problem and a plan. Continue Reading
NAND mirroring has been proposed to break the security in certain portable devices that use NAND flash memory for encryption. Continue Reading
Evaluate Mobile device security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Telemarketing might not be dead, but the near-complete saturation of smartphones in the consumer market has landed some death blows to outbound marketing strategies. Continue Reading
There's more to enterprise mobile security than just mobile device management. Today, IT has more security tools at its disposal, from identity management to analytics. Continue Reading
Biometrics has become a hot topic in mobile technology, as it provides a valuable layer of security to devices and apps. Refresh your memory on the authentication method with this quiz. Continue Reading
Manage Mobile device security
Learn to apply best practices and optimize your operations.
In this excerpt from chapter three of Mobile Data Loss, author Michael T. Raggo discusses mobile security countermeasures. Continue Reading
With mobile devices on the rise in the workplace, it is imperative to know the top security threats these devices bring with them, plus how to prevent breaches from happening. Continue Reading
Mobile device protection can be problematic. Organizations that consider these areas of concern can get ahead of the trend and plan an all-encompassing data protection strategy. Continue Reading
Problem Solve Mobile device security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Flaws in the Apple Notify function and iTunes can enable attackers to inject malicious script into the application side. Expert Michael Cobb explains how these vulnerabilities work. Continue Reading
Android apps infected with Gooligan malware enable attackers to compromise the security of Google accounts. Expert Nick Lewis explains how users can protect themselves. Continue Reading
Exaspy spyware, which can access messages, video chats and more, was found on Android devices owned by executives. Expert Nick Lewis explains how Exaspy is able to avoid detection. Continue Reading