Email Alerts
-
Mobile device security policies should be revisited and revised often
A survey by SearchSecurity.com shows that 64% of companies have a written mobile device security policy. News | 14 Aug 2012
-
Black Hat 2012: SSL handling weakness leads to remote wipe hack
Researcher Peter Hannay's man-in-the-middle attack exploited an SSL handing flaw to remotely wipe Android and iOS mobile devices via Exchange server. News | 30 Jul 2012
-
Apple's AuthenTec purchase may pave way for iOS biometrics
In addition to fingerprint technology, AuthenTec provides mobile security software licenses. One of its customers is Samsung, a main rival of Apple's. News | 27 Jul 2012
-
Putting the mobile botnet threat in perspective
While lucrative mobile botnets do exist, Industry experts provide a perspective on seems to be a relatively small mobile botnet threat. News | 28 Jun 2012
-
Gartner warns enterprises against jailbroken device security risks
The research firm says BYOD policy must ban jailbroken devices, specifically iOS and Android. They make it easy for attackers to breach networks. News | 13 Jun 2012
-
PCI Council urges P2P encryption for mobile payments
A PCI Council guidance document requires merchants to use a validated PIN entry device or secure card reader to accept payments using mobile devices. News | 16 May 2012
-
BYOD security policy, not MDM, at heart of smartphone security
Effective security policies, not a mobile device management platform, will solve corporate mobile device security issues, according to a security expert. News | 13 Apr 2012
-
Experts say it's time for a mobile security review
There are many mobile device management (MDM) platforms, but they may be unnecessary if you can use the security features native to the devices. News | 03 Apr 2012
-
Top 10 mobile risks list highlights fundamental weaknesses
An OWASP team has unveiled a non-hyped list of weaknesses and how to properly mitigate them. News | 21 Mar 2012
-
Symantec acquires Nukona for MDM, mobile application control
Analyst says move is important step in addressing the need for mobile application control and document management capabilities. News | 20 Mar 2012
Security Management Strategies for the CIO