mobile security
![mobile security](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/18175826/mobile_security-device-400x200.jpg)
How do I select a mobile security solution for my business?
The percentage of companies admitting to suffering a mobile-related compromise has grown, despite a higher percentage of organizations deciding not to sacrifice the security …
![strandhogg](https://img.helpnetsecurity.com/wp-content/uploads/2019/12/03121939/strandhogg-400x200.jpg)
StrandHogg 2.0: Critical Android flaw allows app hijacking, data theft
Google has released a patch for CVE-2020-0096, a critical escalation of privilege vulnerability in Android that allows attackers to hijack apps (tasks) on the victim’s …
![businessman](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103112/businessman-400x200.jpeg)
C-suite execs often pressure IT teams to make security exceptions for them
The C-suite is the most likely group within an organization to ask for relaxed mobile security protocols (74%) – despite also being highly targeted by malicious cyberattacks, …
![5G](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/06094247/5g-earth-400x200.jpg)
Operators rethinking security while making rapid progress toward 5G
Mobile service providers say they are making substantial progress toward ushering in a new generation of 5G networks that will enable ultra-high-speed mobile connectivity and …
![Work](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/19140648/work-home-400x200.jpg)
The cybersecurity implications of working remotely
We sat down with Demi Ben-Ari, CTO at Panorays, to discuss the cybersecurity risks of remote work facilitated by virtual environments. The global spread of the COVID-19 …
![Google security](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103613/google_security-400x200.jpg)
Google Advanced Protection users get new protections against Android malware
Google has announced the rollout of two new non-negotiable security features for Android users who have also enrolled in the company’s Advanced Protection Program (APP). …
![mobile work](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095708/mobile_work-400x200.jpg)
Orgs that sacrifice mobile security are twice as likely to suffer a compromise
The percentage of companies admitting to suffering a mobile-related compromise has grown (39%, when compared to last years’ 33%) despite a higher percentage of …
![David Rupprecht and Dr. Katharina Kohls](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/20105604/david-rupprecht_katharina-kohls-400x200.jpg)
By exploiting an LTE vulnerability, attackers can impersonate mobile phone users
Exploiting a vulnerability in the mobile communication standard LTE, researchers at Ruhr-Universität Bochum can impersonate mobile phone users. Consequently, they can book …
![mobile payment](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110344/mobile_payment-400x200.jpg)
93% of attempted mobile transactions in 2019 were fraudulent
93 percent of total mobile transactions in 20 countries were blocked as fraudulent in 2019 according to a report on the state of malware and mobile ad fraud released by …
![mobile apps](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102223/mobile-apps-400x200.jpg)
A 101 guide to mobile device management
Extending beyond the traditional company network, mobile connectivity has become an extension of doing business and IT staff need to not just rethink how existing activities, …
![strandhogg](https://img.helpnetsecurity.com/wp-content/uploads/2019/12/03121939/strandhogg-400x200.jpg)
Crooks are exploiting unpatched Android flaw to drain users’ bank accounts
Hackers are actively exploiting StrandHogg, a newly revealed Android vulnerability, to steal users’ mobile banking credentials and empty their accounts, a Norwegian app …
![Google Play](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102056/google_play-400x200.jpg)
Mobile security firms will help protect Google Play
Google has partnered with mobile security companies ESET, Lookout and Zimperium to identify potentially harmful and unwanted apps before they are listed on Google Play. …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege