mobile devices
McAfee Mobile Security offers enhanced privacy protection
McAfee announced an updated version of McAfee Mobile Security offering new privacy features including the Multi-user App Profile function which allows consumers to create …
How to spot and avoid SMS scams
2013 has been touted by Gartner as the year when mobile phones will overtake PCs as the most common Web access device worldwide. When you think about it, it’s logical, …
CIO concerns over security obstructing enterprise mobility
Despite a clear understanding of the benefits and drivers from the end-user community, companies have not mobilized many applications – and a large percentage are …
Security and privacy risks of top mobile apps
Appthority performed a static, dynamic and behavioral app analysis on the 400 most popular free and paid apps on the iOS and Android platforms. They analyzed each app for …
Mobile operating system wars: Android vs. iOS
When we introduced Clueful for Android, we thought mobile users should know what the applications on their devices were doing. One year and a couple hundred thousand analyzed …
Tips for network administrators as mobile device usage increases
The increase in mobile device has resulted in network challenges for businesses of all types and sizes. According to the Monetate Q1 2013 Ecommerce Quarterly, tablets have …
SaaS enhanced mobile device security
Sophos announced Sophos Mobile Control 3.5, the latest version of its mobile device management (MDM) solution. Available both on-premise and as-a-service, Sophos Mobile …
Pirate Bay founder raising money for new encrypted messaging app
Peter Sunde, one of the Pirate Bay co-founders, is looking to enter the encrypted messaging market. Spurred by the recent revelations about the US government’s PRISM …
12 trends in privacy and security
First identified as an industry issue a decade ago, data breaches are now part of the consumer vocabulary. Data breaches have evolved from credit card fraud with financial …
Android bug allows app code change without breaking signatures
Researchers from Bluebox Security have discovered a critical Android flaw that allows attackers to modify the code of any app without breaking its cryptographic signature, and …
Protect your company from BYOD security threats
With users wanting to connect their personally owned computers to corporate infrastructure, IT admins have to find the right balance between providing services, and securing …
Abuse of mobile app permissions
McAfee Labs found that under the camouflage of “free” apps, criminals are able to get consumers to agree to invasive permissions that allow scammers to deploy …
Featured news
Resources
Don't miss
- Chinese cyber spies are using Ivanti EPMM flaws to breach EU, US organizations
- TikTok videos + ClickFix tactic = Malware infection
- DanaBot botnet disrupted, QakBot leader indicted
- Is privacy becoming a luxury? A candid look at consumer data use
- Unpatched Windows Server vulnerability allows full domain compromise