Please turn on your JavaScript for this page to function normally.
Online backup for mobile devices: Key factors to consider

Most technology users keep personal information (contacts, calendars, documents, photos, etc.) on their mobile devices. That information isn’t protected if the mobile is …

AT&T’s massive call detail record database accessible to DEA agents

Since 2007, AT&T employees have been working side by side with US Drug Enforcement Administration and local law enforcement agents, helping them access electronic call …

Privacy case makes your phone untrackable

With all the recent revelations about NSA’s long cyber reach and the (in)voluntary involvement of big Internet companies and US telecoms in its many surveillance …

New protection mechanism prevents mobile cross-app content stealing

A group of researchers from Indiana University and Microsoft Research have recently published a paper detailing the risk of cross-origin attacks on two of the most popular …

Layer 7 updates mobile access gateway solution

Layer 7 Technologies announced updates to its SecureSpan Mobile Access Gateway, a middleware solution that simplifies enterprise application management. Among its new …

AirWatch and Appthority partner for mobile app risk analysis

Appthority and AirWatch announced that AirWatch EMM is integrated with Appthority’s fully automated App Risk Management service for app analysis and risk management. The …

Mobile security management market to hit billion dollar mark

The Mobile Security Management (MSM) market is emerging as a strong, fledgling submarket of Enterprise Mobility Management (EMM). As Mobile Device Management (MDM) evolves …

Android security flaw puts Bitcoin users at risk

The Bitcoin Foundation has issued a security advisory warning users that have generated their Bitcoin wallet with an Android app that their Bitcoins can be easily stolen. The …

Protect against threats targeting Android

Palo Alto Networks’ WildFire malware analysis sandbox now is capable of analyzing Android applications in the APK file format to identify advanced threats in Android …

Can biometrics revolutionize mobile payment security?

With the explosion in smartphones usage, the number of payments done via mobile devices has significantly increased over recent years. As eCommerce becomes mCommerce, the …

Adoption of antivirus software on mobile devices remains low

Consumer adoption and willingness to pay for antivirus software on mobile devices is low, according to Gartner. Gartner believes that high consumer use of personal mobile …

Researchers create DIY IDS for identifying hacked smartphones

A group of researchers from LMG Security has leveraged a Verizon Samsung femtocell – a small cellular station for extending cell phone coverage range indoors or at the …

Don't miss

Cybersecurity news