mobile devices
5 essential mobile security tips
It doesn’t matter if you’re using iOS, Android, Windows Phone or BlackBerry, these tips apply to every mobile device that connects to the Internet. “How …
Cops must get a warrant before looking through cellphone content
The nine judges of the US Supreme Court have unanimously ruled that law enforcement officers can’t search the contents of an arrested individual’s cell phone(s) …
Invasive Selfmite SMS worm uncovered
AdaptiveMobile has discovered a previously unknown piece of mobile malware dubbed Selfmite. It spreads via SMS and fools users into installing a worm app which propagates by …
Capabilities of “lawful interception” mobile malware revealed
Researchers from Russian AV company Kaspersky Labs and the Citizen Lab of the University of Toronto have released details about the mobile surveillance tools provided by …
Mobile security and incident readiness
AccessData and Gigaom Research released a report on the growing complexities of mobile security and the limitations of “preventive, policy-driven” solutions that …
Authorization model for home automation
Smartphones promise to play an important role in the management and control of Home Automation (HA) solutions. When things and devices have either no or a constrained user …
Financial ransomware now targeting U.S. users
Although the GameOver Zeus botnet and CryptoLocker ransomware have been disrupted, it is still too early for a victory celebration. First, the two week deadline expires on …
Mobile security risks and challenges
Nat Kausik, the CEO at Bitglass, offers advice to organizations moving to an increasingly mobile workforce and discusses the most common mobile security pitfalls. Some …
Most IT admins fear exposure through mobile devices
GFI Software announced the findings of an extensive independent research project examining the “Internet of Things” (IoT) and the impact IT administrators expect …
Mobile ad libraries create major risk for enterprise data
Every day at Mojave Threat Labs, our research team analyzes thousands of mobile apps using more than 200 individual risk factors. One of the key risk factors that we track is …
Keeping your data secure while on the move
John Michael is the CEO at iStorage, a provider of secure portable data storage. In this interview he discusses the often overlooked repercussions of data loss, offers tips …
Misconfiguration to blame for most mobile security breaches
Nearly 2.2 billion smartphones and tablets will be sold to end users in 2014 according to Gartner, Inc. While security incidents originating from mobile devices are rare, …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)