Handheld and Mobile Device Security Best Practices
- September 23, 2014
A new Ponemon survey shows that while enterprises may harbor concerns about BYOD security, business-wide use of personal mobile devices is growing rapidly.
- September 19, 2014
News roundup: Rogue cell phone towers are popping up across the United States, heightening enterprise communication and data privacy concerns. Plus: Goodwill breach update; Adobe patches released; and security in 2025.
- August 29, 2014
News roundup: Endpoint antimalware has been long considered ineffective, yet a recent IDC report projects endpoint security growth. What gives? Plus: AWS Zocalo, new gTLDs, QR code authentication and more.
- August 21, 2014
A vendor report found that while mobile malware may receive more attention, unrestrained mobile app data collection actually poses a greater risk to consumers and data security.
- August 14, 2014
Crypto failures enable attackers to bypass mobile application management products, according to a researcher, leaving sensitive mobile data unprotected and casting doubts on MAM's value.
- August 01, 2014
News roundup: The 'Fake ID' flaw on Android devices allows malicious apps to impersonate trusted ones, putting confidential data at risk and reigniting BYOD security concerns.
- July 25, 2014
News roundup: The revelation of potential iOS backdoors -- and Apple's perceived acknowledgement of them -- has sparked debate over the definition of a backdoor and raised concerns over iOS security.
- July 23, 2014
While BlackBerry's CEO touts the mobile platform's security features, experts question whether the advantage over iOS and Android still exists.
- April 16, 2014
Though millions of Android devices could contain the Heartbleed OpenSSL vulnerability, experts say the risk to Android users may not be that great.
- March 03, 2014
Mobile security gaps stretch from distributed architecture to data leaks. Address security and privacy concerns before any coding starts.