Security Experts:

long dotted


The new FireEye Mobile Security App will help organizations protect Android devices through its mobile malware detection and prevention capabilities and cloud-based app threat assessment solution.
The government argues that smartphones, like other personal items such as wallets or purses, may be searched during an arrest.
According to F-Secure's Q1 2014 Mobile Threat Report, more than 99 percent of new mobile threats discovered by the security firm in the first quarter of 2014 targeted Android users.
According to analysis by researchers at FireEye, roughly 150 million downloads of Android apps contain OpenSSL libraries vulnerable to Heartbleed.
Google is looking to bolster security for Google Android users to protect them against malware.
BlackBerry issued a patch to addresses a remote code execution vulnerability (CVE-2014-1468) that affects BlackBerry 10 smartphones and could enable an attacker to take control of the device with root/superuser rights.
A young startup specializing in Android smartphone lock screens that anticipate what "app" a user might want at any give moment said Monday it has been bought by Twitter.
Good Technology, a provider of secure mobility solutions, has completed its acquisition of BoxTone, a provider enterprise mobile solutions with a focus on mobile service management.
The FTC alleged that Fandango and Credit Karma both disabled the SSL certificate validation process in mobile apps, making them vulnerable to Man-in-the-Middle attacks.
Researchers say the Coinkrypt malware infects Google Android phones to mine cryptocurrencies such as Dogecoin.

FEATURES, INSIGHTS // Mobile Security

rss icon

Dr. Mike Lloyd's picture
The BYOD problem isn’t even about BYOD; it’s about the ability to visualize, understand, and control your whole infrastructure, including this latest addition to the network map.
Nimmy Reichenberg's picture
While BYOD is concerned with the risk from personal devices, BYON (Bring Your Own Network) is a different type of risk
Jon-Louis Heimerl's picture
If regulatory protected information gets onto your device, you are obligated to protect it. Are you fully prepared to guarantee that everything you are doing on your personally managed device meets the obligations of you and your organization to protect sensitive information?
Chris Poulin's picture
Before you join the stampede with all the organizations who have bought into the concept of unifying personal and business devices, consider that one size can risk all.
Marc Solomon's picture
Organizations need to understand the security gaps the Mobile Enterprise presents and embrace a combination of security tools and techniques to bridge these gaps.
Johnnie Konstantas's picture
How can you defend against a new generation of threats and attackers that are leveraging automation and outpacing alerting mechanisms and manual-access controls?
Jon-Louis Heimerl's picture
Hacking a phone is one thing, but hacking voicemail is something else, and while your voicemail does have some protection, breaking into it is not very complicated.
Johnnie Konstantas's picture
IT managers aren’t the only ones aware of this BYOD trend – attackers are too. Whether their aim is to promote a cause (hacktivism) or turn a profit, our mobile devices constitute perhaps the easiest way to do so.
Chris Hinkley's picture
Mobile applications and the platforms they are built on make PA-DSS compliance difficult due to the rapidly evolving threat landscape. With increased attacks and their tragic affects on businesses and consumers, it's important to make make sure your mobile operations properly secured.
Oliver Rochford's picture
Mobile devices share basic components as a PC, but that is truly where the similarities end. The differences are far more important than the shared points, and will scupper most traditional security approaches, which all hinge on one really simple idea.