mobile devices

Sometimes employees follow cybersecurity best practices beyond company policies
Nearly two-thirds (64%) of employees use a company-approved device for work. However, less than half (40%) of those who use a personal device are regulated when using that …

IBM employees banned from using portable storage devices
In an attempt to minimize sensitive data loss, IBM will try out a worldwide, company-wide ban on the use of removable portable storage devices such as USB sticks, SD cards, …

Major uptick in mobile phishing URL click rate
In a study of Lookout users, more than half clicked mobile phishing URLs that bypassed existing security controls. Since 2011, Lookout has observed this mobile phishing URL …

Businesses suspect their mobile workers are being hacked
More than half (57%) of organisations suspect their mobile workers have been hacked or caused a mobile security issue in the last 12 months, according to the iPass Mobile …

Android P: Expected security and privacy improvements
Google has released a developer preview of the next version of Android, currently called “Android P.” Functional changes are many, but here’s an overview of …

New LTE attacks open users to eavesdropping, fake messages, location spoofing
A group of researchers has uncovered ten new attacks against the 4G LTE wireless data communications technology for mobile devices and data terminals. The attacks exploit …

Researchers explore real-world deployment of connected medical devices
ZingBox researchers detected, identified and analyzed the behavior of medical devices deployed in more than 50 hospitals, clinics, and other healthcare locations. Researchers …

Mobile security: A look at the risks, and what you can do
A new report from Verizon found that organizations across numerous industries compromised mobile data security because of speed to market priorities and a lack of threat …

Researchers uncover mobile, PC surveillance platform tied to different nation-state actors
The Electronic Frontier Foundation (EFF) and mobile security company Lookout have uncovered a new malware espionage campaign that has targeted activists, journalists, lawyers, …

CBP releases new guidelines on phone, laptop searches at US borders
Late last week, the US Customs and Border Protection agency released an update to its Directive governing Border Searches of Electronic Devices. According to the new …

Enterprise USB security is outdated and inadequate
While USB drives are ubiquitous for employees across all industries, security policies for these devices are often severely outdated or grossly inadequate for protecting …

An analysis of 120 mobile app stores uncovers plethora of malicious apps
RiskIQ analyzed 120 mobile app stores and more than 2 billion daily scanned resources. In listing and analyzing the app stores hosting the most malicious mobile apps and the …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)