Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Security researchers at Bitdefender have identified a highly sophisticated Android spyware platform that managed to remain undetected for four years. [Read More]
Comparitech researchers have discovered that thousands of Android applications distributed through Google Play leak sensitive information due to Firebase misconfigurations. [Read More]
Industry professionals comment on the security aspects of a newly launched alliance of over 30 tech and telecom firms calling for open and interoperable 5G systems. [Read More]
Samsung has patched a critical vulnerability impacting all of its devices since 2014 that can be exploited through malicious MMS (multimedia) messages, without user interaction. [Read More]
The Czech Republic and the United States have signed a joint declaration Wednesday for cooperating on security of 5G technology. [Read More]
More than 30 technology and telecom firms unveiled an alliance to press for "open and interoperable" 5G wireless systems that eliminate the need for a single supplier. [Read More]
As governments race to develop mobile tracing apps to help contain infections, attention is turning to how officials will ensure users’ privacy. [Read More]
Google this week released the May 2020 security patches for the Android operating system to address several critical vulnerabilities, including one affecting the System component. [Read More]
A threat actor managed to infect more than 75% of the devices within a company by distributing their Android malware through a mobile device management (MDM) server. [Read More]
A new piece of Android malware named EventBot is targeting the users of close to 300 financial applications across the United States and Europe. [Read More]

FEATURES, INSIGHTS // Mobile Security

rss icon

Adam Ely's picture
The mobile strategist will play a pivotal role in mobile integration, as they pave the way for the organizations to do so purposefully and securely.
David Holmes's picture
After the rounds of predictions for 2014, I had bet my colleague that if no mobile DDoS appeared this year, we’d stop talking about it. And it looks like we can.
Adam Ely's picture
While mobile security remains at the top of every CISO’s priority list this year, enterprises have quickly begun to realize that mobile device management (MDM) and enterprise mobility management (EMM) are not enough to keep data safe.
Adam Ely's picture
From what to support to how to ensure the security of mobile apps and data, enterprises are banging their heads against the wall to find a solution to secure mobile.
Adam Ely's picture
We can attempt to predict the future, but without proper security measures in place, data breaches are bound to happen. Unfortunately, it’s not a matter of if a breach will occur, but when.
Adam Ely's picture
When determining how risky an app is, we must consider intentional features within these permissions to determine whether or not they’re a risk to the enterprise.
Adam Ely's picture
At the end of the day, the kill switch will not only decrease the amount of people mugged for their phones because there is little net value in the device itself, but it will also provide individuals with the means to wipe the device of personal information.
Adam Ely's picture
COPE is often an attractive model for organizations concerned about keeping mobile data secure but presents its own set of issues. So how does COPE stack up against BYOD?
Adam Ely's picture
This shift to mobile exposes a major fault that needs to be addressed and security practices must address mobile threats as well.
Adam Ely's picture
Yesterday’s device management approach does not work in a BYOD world. The end users are bringing their own devices, so we need to adjust to accommodate this new world order.