Security Experts:

long dotted


The Blackphone is a fully encrypted smartphone which aims to foil snooping governments, industry rivals and hackers.
Prolexic believes that developers of applications commonly used in DDoS attacks like LOIC will increasingly port them to mobile platforms in 2014.
Successful exploitation of these vulnerabilities could potentially result in an attacker executing code in the context of the application that opens specially crafted Flash content
Samsung says the exploit researchers found does not use a vulnerability in KNOX, but instead abuses legitimate functionality of Google Android.
In this white paper you will learn about the various considerations for defending mobile applications—from the mobile application architecture itself to the myriad testing technologies.
Struggling smartphone maker BlackBerry announced that it plans to open a security innovation center in the Washington, D.C. area.
Keeping to tradition, SecurityWeek invited security experts to weigh in on New Year's resolutions for improving information security and how organizations can better develop new habits in 2014.
Research Vice President at NSS Labs Stefan Frei joins the podcast to discuss his idea -- and the economics -- to support an an International Vulnerability Purchase Program.
A Ponemon study found that 75% of the respondents identified mobile devices such as smart phones as "the greatest risk of potential IT security risk within the IT environment."
In this podcast, FireEye security researcher Vinay Pidathal talks about the MisoSMS botnet that steals SMS messages from Android devices and the state of security on the Android ecosystem.

FEATURES, INSIGHTS // Mobile Security

rss icon

Johnnie Konstantas's picture
How can you defend against a new generation of threats and attackers that are leveraging automation and outpacing alerting mechanisms and manual-access controls?
Jon-Louis Heimerl's picture
Hacking a phone is one thing, but hacking voicemail is something else, and while your voicemail does have some protection, breaking into it is not very complicated.
Johnnie Konstantas's picture
IT managers aren’t the only ones aware of this BYOD trend – attackers are too. Whether their aim is to promote a cause (hacktivism) or turn a profit, our mobile devices constitute perhaps the easiest way to do so.
Chris Hinkley's picture
Mobile applications and the platforms they are built on make PA-DSS compliance difficult due to the rapidly evolving threat landscape. With increased attacks and their tragic affects on businesses and consumers, it's important to make make sure your mobile operations properly secured.
Oliver Rochford's picture
Mobile devices share basic components as a PC, but that is truly where the similarities end. The differences are far more important than the shared points, and will scupper most traditional security approaches, which all hinge on one really simple idea.
Andrew Jaquith's picture
Last spring I predicted that if sales of the BlackBerry PlayBook were less than 1/4 of the number of iPads sold, we'd know what the next five years of enterprise security would look like. How did RIM do? Not so well, as it turns out.
Robert Vamosi's picture
With more and more mobile malware being directed at Android-based phones, you’d think the carriers and manufacturers would respond quickly to security and software updates to the underlying operating systems. According to a new survey that doesn't appear to be the case.
Johnnie Konstantas's picture
Enterprises use smartphones and mobile devices in some manner to improve mobility and productivity, as do government agencies and even small-to-medium sized businesses. These organizations must protect their network and their users – and their devices, whether corporate owned or a user’s personal mobile device – from loss, theft and exploit.
Ram Mohan's picture
Do you allow your employees to surf using open wireless networks from their phones or laptops? What are the easiest ways that attackers can sniff email or gain access to corporate information from these devices? What are the best ways to protect corporation information on the go?
Idan Aharoni's picture
Cybercriminals are jumping on the mobile bandwagon and adapting to it relatively quickly. Like in the 90s, this relatively new platform boasts many opportunities for the shrewd cybercriminal, while many users are oblivious to the potential threats.