BYOD and mobile device security best practices
- May 17, 2019
Google product manager Christiaan Brand discusses the journey to making 1.5 billion Android devices work as 2FA security keys and the plan for the future.
- May 08, 2019
After being a no-show at last year's conference, security and privacy improvements were big themes at Google I/O's first day, including discussion on federated learning.
- December 31, 2018
Vulnerable dating apps on BYODs pose risks to more than just individual users. Find out what security flaws are common in these apps and what they mean for enterprises.
- June 22, 2018
Android and iOS mobile apps that use unprotected Firebase databases leaked over 100 million records that include PHI, financial records and authentication information.
- June 06, 2018
A rumored security feature, USB Restricted Mode, is making its premiere in Apple's iOS 12 and will protect users from brute-force passcode attacks by thieves and law enforcement alike.
- November 15, 2017
In this week's Risk & Repeat podcast, SearchSecurity editors discuss the recent discovery of a fake WhatsApp app in the Google Play Store and what that means for app store security.
- July 28, 2017
Application security expert Michael Cobb discusses the Samsung Knox platform and its ability to improve Android device security in the enterprise.
- July 07, 2017
Broadpwn, a flaw in Broadcom Wi-Fi chipsets, is patched, but Google withholds details. Plus, the latest in the antivirus drama between the U.S. and Russia, and more.
- December 30, 2016
News roundup: FDA issues new medical device cybersecurity guidance. Plus, Obama announces the U.S. government's response to Russian hacking; PHP flaws patched; more.
- November 16, 2016
Researchers discover Italian-sourced Android spyware linked to Hacking Team, but it could be the work of another surveillance software vendor.
- September 30, 2016
In part two of his interview with SearchSecurity, MobileIron's James Plouffe talks about his role as a technical consultant on 'Mr. Robot' and how the show achieves its authenticity.
- September 29, 2016
A new report from MobileIron shows enterprises aren't taking mobile threats seriously enough. MobileIron's James Plouffe explains what that is and what's to be done about it.
- May 13, 2016
MobileIron's enterprise mobile management software wasn't installed on the iPhone of San Bernardino shooter Syed Rizwan Farook. Was that the right move?
- April 15, 2016
The encryption debate continues with release of the official draft of Burr-Feinstein 'Compliance with Court Orders Act of 2016' mandating court order compliance.
- April 08, 2016
WhatsApp encryption was turned on for all types of messaging, including group chats, which advanced the conversation on 'going dark,' as new encryption legislation draft goes public.
- November 10, 2015
Bluebox Security unveiled a troubling study on mobile application threats and also introduced a new product to protect consumer apps on employee-owned devices.
- September 25, 2015
News roundup: More fingerprint records were stolen during the OPM breach than originally reported. Plus: the $1 million iOS bounty; DHS CISO calls for harsher phishing policies; Safe Harbor in hot water.
- September 18, 2015
News roundup: Additional research shows a Cisco router implant affects more devices than originally reported. Plus: Let's Encrypt's first cert issued; Tor in the library; the mitigated (but not fixed) iOS AirDrop vulnerability.
- August 14, 2015
News roundup: Government email security got pummeled this week with news of hacks, breaches, unlabeled classified data and spying. Plus: Hacking a Corvette via text; Android sandbox bypass flaw; Oracle CSO blogs against reverse-engineering.
- August 13, 2015
Wearables are the next wave of BYO devices infiltrating the enterprise. Domingo Guerra, president and co-founder of Appthority, talked to SearchSecurity at RSA Conference 2015 about how to address the onslaught.
- July 31, 2015
News roundup: New threats add to the Tor anonymity debate, as a new browser aims to take anonymous browsing to the next level. Plus: Android security outlook is bad -- or is it? Also, another Xen host escape flaw and Wassenaar revisions put on hold.
- July 24, 2015
News roundup: A wireless car hack demonstration has pushed vehicle security legislation and DMCA exemptions into the spotlight, and prompted a manufacturer recall. Plus: Hacking Team update; DHS email issues; and smartwatches vulnerable to attack.
- May 29, 2015
As the global smartphone market slows, it's becoming readily apparent that the rise of smartphone security threats isn't slowing -- and no OS is safe.
- May 08, 2015
News roundup: Contradicting mobile malware statistics published this year prove the mobile malware debate is alive and well. Plus: SAP vulnerabilities; spam-sending Linux malware; criminal attacks leading healthcare threat.
- March 27, 2015
News roundup: The ban of "booth babes" at RSA Conference 2015 has been met with praise; does it equal an increase of women in infosec? Plus: Cyberthreat data-sharing bill advances; Flash flaw exploited days after patching; new twist on Google Play ...
- March 25, 2015
The Ponemon Institute says enterprises are devoting millions of dollars to mobile application development, but barely any of the money is focused on security.
- March 23, 2015
A new open source security tool from CERT, dubbed 'Tapioca,' shows that Android app vulnerabilities are ubiquitous, according to new research from IBM.
- January 05, 2015
Experts say unified endpoint management for mobile devices, laptops and desktops will take more time due to the complex, evolving demands of mobile security management.
- November 21, 2014
News roundup: As the industry responds to growing demand for end-to-end Internet encryption, some fear unintended consequences. Plus: Black hats wanted; Windows Phone survives Pwn2Own; webcam spying resurgence.
- October 31, 2014
News roundup: Verizon gave its mobile users an early Halloween trick: a cookie that cannot be erased, despite a number of privacy concerns. Also: compromising an air-gapped computer over the air; an alleged government-funded hack against a CBS ...
- September 23, 2014
A new Ponemon survey shows that while enterprises may harbor concerns about BYOD security, business-wide use of personal mobile devices is growing rapidly.
- September 19, 2014
News roundup: Rogue cell phone towers are popping up across the United States, heightening enterprise communication and data privacy concerns. Plus: Goodwill breach update; Adobe patches released; and security in 2025.
- August 29, 2014
News roundup: Endpoint antimalware has been long considered ineffective, yet a recent IDC report projects endpoint security growth. What gives? Plus: AWS Zocalo, new gTLDs, QR code authentication and more.
- August 21, 2014
A vendor report found that while mobile malware may receive more attention, unrestrained mobile app data collection actually poses a greater risk to consumers and data security.
- August 14, 2014
Crypto failures enable attackers to bypass mobile application management products, according to a researcher, leaving sensitive mobile data unprotected and casting doubts on MAM's value.
- August 01, 2014
News roundup: The 'Fake ID' flaw on Android devices allows malicious apps to impersonate trusted ones, putting confidential data at risk and reigniting BYOD security concerns.
- July 25, 2014
News roundup: The revelation of potential iOS backdoors -- and Apple's perceived acknowledgement of them -- has sparked debate over the definition of a backdoor and raised concerns over iOS security.
- July 23, 2014
While BlackBerry's CEO touts the mobile platform's security features, experts question whether the advantage over iOS and Android still exists.
- April 16, 2014
Though millions of Android devices could contain the Heartbleed OpenSSL vulnerability, experts say the risk to Android users may not be that great.
- March 03, 2014
Mobile security gaps stretch from distributed architecture to data leaks. Address security and privacy concerns before any coding starts.
- February 03, 2014
The influx of iPad and Android tablets and smartphones after the holidays can really challenge network security in organizations that support BYOD.
- February 03, 2014
What is mobile malware? HP says detection rates among mobile AV vendors vary greatly as experts struggle to define malicious activity in apps.
- December 05, 2013
A recent study by HP found that 9 in 10 iPhone apps have potential vulnerabilities.
- November 15, 2013
Video: Do new iOS 7 security features and the addition of Touch ID bring real benefits to Apple mobile security? Securosis CEO Rich Mogull discusses.
- October 29, 2013
The widespread iOS app vulnerability, which stems from the way many mobile applications handle caching, allows attackers to control an app's content.
- October 22, 2013
A Fortinet survey shows that a majority of young users will violate IT security policies governing BYOD and cloud services to boost productivity.
- September 26, 2013
At the 2013 (ISC)2 Security Congress, experts highlighted why a data-centric approach is necessary for an effective mobile risk management program.
- August 01, 2013
We polled readers in our annual Enterprise Mobile Security Survey and the 2013 results are in.
- June 13, 2013
A Gartner analyst says enterprise BYOD -- specifically iOS and Android devices -- presents many pros and cons for enterprise endpoint security.
- June 03, 2013
Philip Clarke, co-leader of the Wireless and Mobility track at Nemertes Research, reports on what’s ahead for mobile device management solutions.
- April 10, 2013
Security testing vendor Veracode has released a report showing that mobile apps aren't getting their cryptography right.
- February 27, 2013
RSA exhibitors offered a range of mobile application management solutions, intended to ease the challenges of monitoring BYOD environments.
- February 18, 2013
Enterprises have yet to roll out mobile versions of most of their applications, a recent survey says. One key factor moving forward is security.
- February 13, 2013
Struggling to define your mobile app security strategy? Gary McGraw offers a manifesto to help get infosec and app developers on the same page.
- December 24, 2012
A new smartphone or tablet under the Christmas tree should be giftwrapped with a list of security and privacy guidelines, experts say.
- November 13, 2012
More than half of mobile-device security decision makers surveyed say that BYOD challenges remain.
- September 02, 2012
Security pros need to understand the total costs and potential ROI of BYOD policies.
- August 17, 2012
Lost and stolen devices remain two of the top mobile security issues revealed in SearchSecurity.com's 2012 enterprise mobile security survey.
- August 14, 2012
A survey by SearchSecurity.com shows that 64% of companies have a written mobile device security policy.
- July 30, 2012
Researcher Peter Hannay's man-in-the-middle attack exploited an SSL handing flaw to remotely wipe Android and iOS mobile devices via Exchange server.
- July 27, 2012
In addition to fingerprint technology, AuthenTec provides mobile security software licenses. One of its customers is Samsung, a main rival of Apple's.
- June 28, 2012
While lucrative mobile botnets do exist, Industry experts provide a perspective on seems to be a relatively small mobile botnet threat.
- June 13, 2012
The research firm says BYOD policy must ban jailbroken devices, specifically iOS and Android. They make it easy for attackers to breach networks.
- May 22, 2012
At ISD 2012, many of the industry's leading information security experts gathered to share vendor-neutral expertise and proven security strategies.
- May 16, 2012
A PCI Council guidance document requires merchants to use a validated PIN entry device or secure card reader to accept payments using mobile devices.
- April 13, 2012
Effective security policies, not a mobile device management platform, will solve corporate mobile device security issues, according to a security expert.
- April 03, 2012
There are many mobile device management (MDM) platforms, but they may be unnecessary if you can use the security features native to the devices.
- March 20, 2012
Analyst says move is important step in addressing the need for mobile application control and document management capabilities.
- March 15, 2012
Tight controls over the mobile device and the use of VPN tunnels could be employed in enterprise mobile security plans.
- February 21, 2012
BYOD policy issues are a big concern for enterprises grappling to secure employee smartphones and tablets, say analysts previewing RSA 2012.
- February 14, 2012
Centrify mobile security supports Apple iOS and Google Android devices and can connect them to Microsoft Active Directory, but it lacks the robust management features found in major MDM suites, analyst says.
- January 31, 2012
Beta version of IBM Endpoint Manager for Mobile Devices supports Apple iOS, Google Android, Symbian and Microsoft Windows Phone devices.
- January 27, 2012
Mobile application supports Android smartphones and tablets with virus scanning and protection from Web threats and SMS attacks.
- December 28, 2011
The increase in smartphones and other mobile devices has fueled demand for IT security pros with mobile app security and networking skills, say several cybersecurity career experts.
- December 09, 2011
Experts share their 2012 mobile security threat predictions.
- December 09, 2011
SearchSecurity.com's news team explores the challenges and technologies enterprises must know to successfully manage mobile security.
- December 06, 2011
Enterprises should educate device owners about setting application permissions and mobile application developers should add notification features to establish trust with users, experts say.
- November 23, 2011
The mobile device management market offers options for mobile device security challenges, but there's no clear consensus on how to choose a product.
- November 18, 2011
Opinion: BlackBerry security has been a boon to enterprises, and unless security pros help save the platform, enterprise mobile security will suffer.
- November 14, 2011
Experts say an enterprise mobile device security policy alone will fall short without the technology to enforce it.
- September 20, 2011
Companies without a mobile device security policy risk not only losing data, but also running afoul of the law.
- August 25, 2011
Does your enterprise have an Android security policy? Senior Site Editor Eric B. Parizo says the growing number of Android Trojans now demand it.
- May 24, 2011
Lost and stolen devices are seen as the greatest security concern for IT professionals, according to a new report by McAfee and Carnegie Mellon University.
- May 11, 2011
The networking giant found a 400% increase in Android malware and a rise in spyware targeting iPhone and Blackberry devices.
- March 21, 2011
Technologies that enable credit card payments via mobile phones have prompted the PCI Council to start a mobile task force.
- February 15, 2011
Kingston Digital has added the Data Traveler 4000 (DT4000) and Data Traveler Vault—Privacy Managed (DTVPM) to its line of portable device security products.
- January 27, 2011
It may seem like more mobile hype, but Senior Site Editor Eric B. Parizo writes that there are legitimate reasons why mobile device threats may be on the rise.
- November 16, 2009
As companies shave operational costs by hiring more remote workers, IT security teams should plan to protect sensitive data being used by a highly mobile workforce in 2010.
- July 30, 2009
Researchers have figured out a way to spoof sender numbers, bypass carrier protections and trick mobile devices to pull content from an attacker's server. This would leave users vulnerable to phishing attacks and other scams.
- March 19, 2009
Push notification, copy/paste and Bluetooth peer-to-peer communication features give hackers new areas to target.
- February 19, 2009
Although smartphone makers are reporting millions of devices being sold, IT has been slow to address the security issues that arise from their use in the office.
- February 18, 2009
Organizations are worried about increased use of blogs, wikis and other social media websites, but budget limitations may be holding back investments in DLP.
- December 22, 2008
Check Point said its acquisition of Nokia's security business will help it expand its line of security products.
- November 17, 2008
Symantec researchers have discovered a new worm attacking the Windows CE platform on ARM processors.
- October 22, 2008
The new Laptop Guardian tracks the location of lost or stolen laptops and gives IT pros the ability to wipe the hard drive remotely.
- July 24, 2008
A new survey found more consumers using their smartphones to access sensitive corporate data opening huge security gaps for enterprises.
- October 09, 2007
McAfee is acquiring endpoint encryption vendor SafeBoot Corp. in a $350 million deal to bolster the antivirus vendor's mobile device security software.
- October 01, 2007
The latest retailer to suffer a security breach is Gap Inc., which blames the exposure of data on 800,000 job applicants on a third-party vendor that manages the information.
- September 26, 2007
Metasploit creator HD Moore has published shellcode for Apple's iPhone, turning the device into a pocket-sized attack platform.
- May 07, 2007
The TJX hackers started their assault two years ago by attacking security holes in the retail giant's wireless system outside a Minnesota Marshalls.