Security Experts:

long dotted


Apple has finally released an iOS update that should fully patch the Group FaceTime bug that could have been exploited to spy on users. [Read More]
France will soon make proposals to reinforce the security of mobile telephone networks, after the US stepped up pressure on Europe to block China's Huawei from building 5G networks. [Read More]
Two members of the U.S. House of Representatives have sent a letter to Apple to obtain some clarifications on how the tech giant handled the recently disclosed FaceTime spying bug. [Read More]
The Siri Shortcuts that Apple introduced in iOS 12 can be abused by attackers for malicious purposes, IBM’s security researchers have discovered. [Read More]
New York’s attorney general and governor launched an investigation into the recently disclosed FaceTime spying bug, particularly Apple’s failure to warn users and the company’s slow response. [Read More]
Facebook paid users, including teens, to track their smartphone activity as part of an effort to glean more data that could help the social network's competition efforts. [Read More]
Apple is working on a patch for a FaceTime vulnerability that can be exploited to spy on people. The attack involves a FaceTime call to the targeted user, but the victim doesn’t have to pick up. [Read More]
Netcraft launches mobile app designed to protect users against phishing and other attacks. Android version available and iOS version coming soon. [Read More]
AWS launches Amazon WorkLink, a service that enables organizations to provide employees easy and secure access to internal assets from their mobile devices. [Read More]
WhatsApp now only allows users to forward a message to a maximum of 5 people in an effort to prevent the platform being abused to spread false information. [Read More]

FEATURES, INSIGHTS // Mobile Security

rss icon

John Maddison's picture
There are three basic security components that every organization with an open BYOD strategy needs to be familiar with.
Laurence Pitt's picture
By paying just a bit more attention to the permissions you are allowing on your phone or computer, you could protect yourself from a much more significant headache down the road.
Alastair Paterson's picture
While less powerful than desktops and servers used for this purpose, more Android devices exist, and they are often less protected and, thus, more easily accessible.
Scott Simkin's picture
Users, networks and applications can – and should— exist everywhere, which puts new burdens on security teams to protect them in the same way as the traditional perimeter.
Alastair Paterson's picture
By understanding what’s up with your mobile apps, you can mitigate the digital risk to your organization, employees and customers.
Adam Ely's picture
In this day of BYOD devices and zero-trust operating environments, IT and security professionals gain nothing from trying to manage the unmanageable—which is just as well, because the device is no longer the endpoint that matters.
Simon Crosby's picture
While flexibility offers countless benefits for corporations and their employees, this new emphasis on mobility has also introduced a new set of risks, and this in turn re-ignites a focus on endpoint security.
Adam Ely's picture
Applying a zero trust model to mobile and the right security controls at the app level could align productivity and security. But the bottom line is that it’s no longer about the device; it’s about the applications.
David Holmes's picture
DDoS continues to wax and wane in unpredictable cycles, but the ecosystem has evolved to keep it out of the mobile space.
Adam Ely's picture
The mobile strategist will play a pivotal role in mobile integration, as they pave the way for the organizations to do so purposefully and securely.