Security Experts:

long dotted


Google has begun issuing over the air (OTA) security-focused updates to its Android-based Nexus devices, which the search giant says will happen on a monthly basis.
Samsung said on Wednesday that it will soon implement a new Android security update process that fast tracks the security patches over the air when security vulnerabilities are uncovered.
Hacking Team leak reveals Android backdoor capable of bypassing Google Play verification process.
Avast has acquired Remotium, a provider of enterprise mobility solutions, for an undisclosed sum.
Fake version of popular BatteryBot Pro app displays ads, downloads other malware, and sends SMSs to premium rate numbers, Zscaler warns.
Mobile malware steals messages from a sandboxed communications app by abusing an Android accessibility feature.
Scrambl3 was launched as a stand-alone app for Android devices by startup USMobile, which describes it as a way to create "trusted connections on untrusted networks."
Japan's largest mobile service provider, NTT DoCoMo, said it would replace passwords with biometric credentials on a number of its online services, in a step to move users closer to a password-free world.
The US National Security Agency developed plans to hack into data links to app stores operated by Google and Samsung to plant spyware on smartphones, a media report said.
Researchers determined that the factory reset feature in Android is not very efficient, allowing potential attackers to easily recover sensitive information.

FEATURES, INSIGHTS // Mobile Security

rss icon

Torsten George's picture
Many security experts believe the next wave of enterprise hacking will be carried out via the mobile channel. What steps can be taken to maintain the productivity gains and cost-savings associated with BYOD, while proactively managing and mitigating security risks associated with this practice?
Ryan Naraine's picture
Costin Raiu of Kaspersky Lab's global research and analysis team talks about the global implications of the Icefog APT campaign and discloses that a major command-and-control shutdown is currently underway.
Michael Callahan's picture
The problem with this Internet of Things is that the manufacturers of "smart" devices are not always as concerned about security as we end-users might want them to be.
Ryan Naraine's picture
Jerry Bryant, Senior Security Strategist in the Microsoft Trustworthy Computing group chats about the company's thinking behind the expansion of the Microsoft Active Protections Program (MAPP).
Wade Williamson's picture
As security professionals, it’s our job to see around the corner whenever possible. While the sky is not falling, if controlling mobile malware isn’t on your radar, it definitely should be.
Ryan Naraine's picture
Security researchers Charlie Miller and Chris Valasek join the podcast to talk about their work hacking the into modern vehicles to manipulate steering, acceleration, speedometers and safety sensors.
Gant Redmon's picture
Being in a public place makes you fair game. So what makes a place private instead of public? This is where that famed “reasonable person” comes in.
Avi Chesla's picture
While Long Term Evolution (LTE) networks bring the promise of relieving traffic jams for mobile operators, they also entail new security risks.
Nick Cavalancia's picture
Company Owned, Personally Enabled devices (COPE) provide a high-degree of centralized control and monitoring while allowing employees to install consumerized, personal-use applications.
Nick Cavalancia's picture
There is no way to deal with the risk that BYOD brings. Between Android and iOS, there are millions of apps readily available for download, countless numbers of which open up doors in BYOD technologies that hackers and cybercriminals can easily stroll through.