Handheld and Mobile Device Security Best Practices
- January 05, 2015
Experts say unified endpoint management for mobile devices, laptops and desktops will take more time due to the complex, evolving demands of mobile security management.
- November 21, 2014
News roundup: As the industry responds to growing demand for end-to-end Internet encryption, some fear unintended consequences. Plus: Black hats wanted; Windows Phone survives Pwn2Own; webcam spying resurgence.
- October 31, 2014
News roundup: Verizon gave its mobile users an early Halloween trick: a cookie that cannot be erased, despite a number of privacy concerns. Also: compromising an air-gapped computer over the air; an alleged government-funded hack against a CBS ...
- September 23, 2014
A new Ponemon survey shows that while enterprises may harbor concerns about BYOD security, business-wide use of personal mobile devices is growing rapidly.
- September 19, 2014
News roundup: Rogue cell phone towers are popping up across the United States, heightening enterprise communication and data privacy concerns. Plus: Goodwill breach update; Adobe patches released; and security in 2025.
- August 29, 2014
News roundup: Endpoint antimalware has been long considered ineffective, yet a recent IDC report projects endpoint security growth. What gives? Plus: AWS Zocalo, new gTLDs, QR code authentication and more.
- August 21, 2014
A vendor report found that while mobile malware may receive more attention, unrestrained mobile app data collection actually poses a greater risk to consumers and data security.
- August 14, 2014
Crypto failures enable attackers to bypass mobile application management products, according to a researcher, leaving sensitive mobile data unprotected and casting doubts on MAM's value.
- August 01, 2014
News roundup: The 'Fake ID' flaw on Android devices allows malicious apps to impersonate trusted ones, putting confidential data at risk and reigniting BYOD security concerns.
- July 25, 2014
News roundup: The revelation of potential iOS backdoors -- and Apple's perceived acknowledgement of them -- has sparked debate over the definition of a backdoor and raised concerns over iOS security.