Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Smartphones can be easily tracked by leveraging an old, yet unpatched security vulnerability in global cellular networks, a researcher has demonstrated. [Read More]
In its Android Security Year In Review report for 2015, Google presented some of the main changes brought to the mobile operating system. [Read More]
Apple on Tuesday denied providing Chinese authorities with special access to its devices, as the iPhone maker defended its position on encryption and cooperation with US law enforcement. [Read More]
The threat group behind Operation C-Major has used Android and BlackBerry spyware against targets in India [Read More]
The California Assembly Bill 1681 was quietly dropped this week without a vote. The bill would have authorized $2,500 penalties for phone manufacturers and operating system providers if they do not comply with court orders to decrypt phones. [Read More]
An unpatched iPhone 6s vulnerability can be exploited to bypass the lockscreen and access photos and contacts [Read More]
The April 2016 Nexus Security Bulletin resolves a total of 39 vulnerabilities in Android, 15 of which are rated Critical, 16 High, and 8 Moderate. [Read More]
FireEye researchers detail another iOS app hot-patching solution that can be abused for malicious purposes [Read More]
Malicious hackers can install malware on iOS devices by abusing the mobile device management (MDM) solutions used by many enterprises [Read More]
Cellebrite is believed to be the company that will help the FBI hack the iPhone belonging to the San Bernardino shooter [Read More]

FEATURES, INSIGHTS // Mobile Security

rss icon

Adam Ely's picture
In this day of BYOD devices and zero-trust operating environments, IT and security professionals gain nothing from trying to manage the unmanageable—which is just as well, because the device is no longer the endpoint that matters.
Simon Crosby's picture
While flexibility offers countless benefits for corporations and their employees, this new emphasis on mobility has also introduced a new set of risks, and this in turn re-ignites a focus on endpoint security.
Adam Ely's picture
Applying a zero trust model to mobile and the right security controls at the app level could align productivity and security. But the bottom line is that it’s no longer about the device; it’s about the applications.
David Holmes's picture
DDoS continues to wax and wane in unpredictable cycles, but the ecosystem has evolved to keep it out of the mobile space.
Adam Ely's picture
The mobile strategist will play a pivotal role in mobile integration, as they pave the way for the organizations to do so purposefully and securely.
David Holmes's picture
After the rounds of predictions for 2014, I had bet my colleague that if no mobile DDoS appeared this year, we’d stop talking about it. And it looks like we can.
Adam Ely's picture
While mobile security remains at the top of every CISO’s priority list this year, enterprises have quickly begun to realize that mobile device management (MDM) and enterprise mobility management (EMM) are not enough to keep data safe.
Adam Ely's picture
From what to support to how to ensure the security of mobile apps and data, enterprises are banging their heads against the wall to find a solution to secure mobile.
Adam Ely's picture
We can attempt to predict the future, but without proper security measures in place, data breaches are bound to happen. Unfortunately, it’s not a matter of if a breach will occur, but when.
Adam Ely's picture
When determining how risky an app is, we must consider intentional features within these permissions to determine whether or not they’re a risk to the enterprise.