Venafi has launched a new product that the company describes as a mobile device "kill switch" which gives IT security teams the ability to instantly cut off mobile access to applications and networks when suspicious activity is detected.
Mobile security startup Mojave Networks announced that it has closed a $5 million round of funding, in addition to launching a cloud-based, enterprise-grade solution that protects mobile devices starting at the network level.
A survey of 2,100 applications from Forbes Global 2000 companies found that many are accessing personal information such as address books while failing to utilize encryption and other security measures.
On Wednesday at the Mobile Pwn2Own hacking contest taking place at the PacSec Applied Security Conference in Tokyo, security researchers demonstrated two iPhone exploits that leverage Apple’s Safari mobile web browser.
At Mobile Pwn2Own, team MBSD, of Japanese firm Mitsui Bussan Secure Directions, Inc., earned $40,000 for their exploit efforts which enabled them to successfully compromise the Samsung device running Google’s Android.
IT managers aren’t the only ones aware of this BYOD trend – attackers are too. Whether their aim is to promote a cause (hacktivism) or turn a profit, our mobile devices constitute perhaps the easiest way to do so.
Mobile applications and the platforms they are built on make PA-DSS compliance difficult due to the rapidly evolving threat landscape. With increased attacks and their tragic affects on businesses and consumers, it's important to make make sure your mobile operations properly secured.
Mobile devices share basic components as a PC, but that is truly where the similarities end. The differences are far more important than the shared points, and will scupper most traditional security approaches, which all hinge on one really simple idea.
Last spring I predicted that if sales of the BlackBerry PlayBook were less than 1/4 of the number of iPads sold, we'd know what the next five years of enterprise security would look like. How did RIM do? Not so well, as it turns out.
With more and more mobile malware being directed at Android-based phones, you’d think the carriers and manufacturers would respond quickly to security and software updates to the underlying operating systems. According to a new survey that doesn't appear to be the case.
Enterprises use smartphones and mobile devices in some manner to improve mobility and productivity, as do government agencies and even small-to-medium sized businesses. These organizations must protect their network and their users – and their devices, whether corporate owned or a user’s personal mobile device – from loss, theft and exploit.
Do you allow your employees to surf using open wireless networks from their phones or laptops? What are the easiest ways that attackers can sniff email or gain access to corporate information from these devices? What are the best ways to protect corporation information on the go?
Cybercriminals are jumping on the mobile bandwagon and adapting to it relatively quickly. Like in the 90s, this relatively new platform boasts many opportunities for the shrewd cybercriminal, while many users are oblivious to the potential threats.