mobile devices
The challenges of securing mobile workers and keeping data secure
Recently, Apricorn announced new research highlighting that 95 percent of surveyed organisations in the UK recognise problems with mobile and remote working, and nearly one in …
Facebook gave user data access to Chinese mobile device makers, too
On Sunday, The New York Times revealed that Facebook has been providing mobile phone and tablet vendors access to user (and users’ friends’) data even though the …
High-level vulnerabilities discovered in 84% of Android shopping apps
More than 84% of the shopping apps have three or more high-level security vulnerabilities, according to a security assessment by Appknox and Seworks. A total of 274 …
Internet of Things: Who is watching you?
An overwhelming number of IT security professionals (85%) see a cyberattack on critical infrastructure happening in the next five years. Pwnie Express CEO Todd DeSisto says …
Sometimes employees follow cybersecurity best practices beyond company policies
Nearly two-thirds (64%) of employees use a company-approved device for work. However, less than half (40%) of those who use a personal device are regulated when using that …
IBM employees banned from using portable storage devices
In an attempt to minimize sensitive data loss, IBM will try out a worldwide, company-wide ban on the use of removable portable storage devices such as USB sticks, SD cards, …
Major uptick in mobile phishing URL click rate
In a study of Lookout users, more than half clicked mobile phishing URLs that bypassed existing security controls. Since 2011, Lookout has observed this mobile phishing URL …
Businesses suspect their mobile workers are being hacked
More than half (57%) of organisations suspect their mobile workers have been hacked or caused a mobile security issue in the last 12 months, according to the iPass Mobile …
Android P: Expected security and privacy improvements
Google has released a developer preview of the next version of Android, currently called “Android P.” Functional changes are many, but here’s an overview of …
New LTE attacks open users to eavesdropping, fake messages, location spoofing
A group of researchers has uncovered ten new attacks against the 4G LTE wireless data communications technology for mobile devices and data terminals. The attacks exploit …
Researchers explore real-world deployment of connected medical devices
ZingBox researchers detected, identified and analyzed the behavior of medical devices deployed in more than 50 hospitals, clinics, and other healthcare locations. Researchers …
Mobile security: A look at the risks, and what you can do
A new report from Verizon found that organizations across numerous industries compromised mobile data security because of speed to market priorities and a lack of threat …
Featured news
Sponsored
Don't miss
- How to make Infrastructure as Code secure by default
- Suspect arrested over the Transport for London cyberattack
- Adobe completes fix for Reader bug with known PoC exploit (CVE-2024-41869)
- Losses due to cryptocurrency and BEC scams are soaring
- Top priorities for federal cybersecurity: Infrastructure, zero trust, and AI-driven defense