Security Experts:

Mobile & Wireless
long dotted


Silent Circle announced on Monday that it has started shipping its Blackphone 2 , the first component of its Enterprise Privacy Platform (EPP) announced earlier this year.
BlackBerry announced plans Friday to sell an Android-powered smartphone, in the latest reboot effort from the faded star of the sector.
A malicious application disguised as a game called BrainTest could potentially have been installed on up to one million devices, according to Check Point.
G DATA's SECURE CHAT for Android is a multiple-encrypted SMS and chat communication application for users looking to keep their text-based communications private.
According to Bluebox, even the top 10 most popular mobile travel apps lack proper security, and all of the analyzed programs include critical flaws.
Apple’s newly announced iOS 9 comes with updated security features such as a revamped app sideloading process and improved two-factor authentication, both meant to keep users and their devices better protected from malware and compromise.
A new Android screening-locking malware targeting mainly users in the United States has been discovered by ESET researchers, who say this is the first ransomware to change a smartphone’s PIN security code.
Google launched Mobile Application Management (MAM) for iOS devices, a solution to help Google Apps administrators recommend and manage applications that employees should install and use on their managed iOS devices in the workplace.
New Android malware has been discovered in a series of Android applications and games in Google Play, capable of covertly subscribing users to premium-rate services, a recent report from Bitdefender reveals.
Old, outdated iOS devices pose a significant risk to the network of any organization, and could easily put the business at risk of a data breach, a recent report from security firm Duo Labs said.

FEATURES, INSIGHTS // Mobile & Wireless

rss icon

Adam Ely's picture
COPE is often an attractive model for organizations concerned about keeping mobile data secure but presents its own set of issues. So how does COPE stack up against BYOD?
Adam Ely's picture
This shift to mobile exposes a major fault that needs to be addressed and security practices must address mobile threats as well.
Marc Solomon's picture
To help cybersecurity professionals cut through the hype and gain a better understanding of what to expect as the Internet of Everything continues to evolve, these top 10 observations might help.
Adam Ely's picture
Yesterday’s device management approach does not work in a BYOD world. The end users are bringing their own devices, so we need to adjust to accommodate this new world order.
Adam Ely's picture
Security teams and lines of business have reached a turning point on BYOD. It’s now become more important than ever for the CISO to figure out how to manage risk without inhibiting users.
Adam Ely's picture
Many of us create our own blind spots through assumption. Until we understand what is occurring on mobile devices, we cannot determine if our controls are effective at managing risk.
Adam Ely's picture
CISOs are notoriously disliked. Trying to protect company, customer and employee data often means having to say “no” to new projects and implementations. This does not earn you many friends.
Ryan Naraine's picture
John Hultquist, Manager of Cyber Espionage Threat Intelligence at ISIGHT Partners, joins the podcast to talk about "NEWSCASTER," a cyber espionage operation that uses fictitious social media accounts to launch attacks.
Danelle Au's picture
Enterprises must find the right balance to deliver a mobile security environment that meets productivity and flexibility needs without putting devices, apps, or data at risk.
Ryan Naraine's picture
In this podcast, Richard Boscovich, assistant general counsel in the Microsoft Digital Crimes Unit, talks about the new Microsoft Cybercrime Center and the ongoing battle to stop the proliferation of botnets around the world.