Mobile Security

Mobile security news, trends, analysis and practical advice

Computerworld - Mingis on Tech - video podcast teaser [3x2/1800x1200]
android vs ios security boxing battle boxing gloves

emm predictions 2017 mdm

MDM comparison: VMware AirWatch vs. IBM Maas360

Real-world users of mobile device management systems weigh in on two big players in the market: VMware AirWatch and IBM MaaS360.

google glass enterprise edition

Is Google Glass really ready for the enterprise?

Google Glass Enterprise Edition is now available to more businesses through its network of development partners, but does it really work as a collaboration and productivity tool?

mobile device management

Choosing EMM software as an add-on may soon be unnecessary

Enterprise mobility management is quickly becoming just another set of tools in a larger software bundle offered by big-name vendors -- leaving IT managers to decide whether to even consider independent software providers.

mobile security data protection [Thinkstock]

What is app wrapping? One way to more secure mobile apps

As part of a mobile application management strategy, app wrapping allows developers and administrators to apply security enforcement policies to a mobile app without changing its look or functionality.

mobile payments / tablet

How to expose flaws in custom-built mobile apps

As companies move toward a mobile-first strategy, more and more are developing apps in-house -- and unwittingly exposing themselves to cybersecurity flaws. Here's how to avoid that problem.

facial recognition biometrics

Facial recognition in the new iPhone would make huge waves

Amid reports that Apple is preparing to abandon fingerprint biometric authentication in favor of 3D facial recognition coupled with iris scans, the mobile industry is preparing for authentication upheaval.

mobile device management

What's the difference between MDM, MAM, EMM and UEM?

While BYOD made it easier for employees to get their jobs done anywhere, anytime, keeping company data safe requires serious management. Here's how to pick between Mobile Application Management and Mobile Device Management.

nordvpn

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN has discounted their popular VPN software 72%. Use our link and see the discount applied when you click "buy now".

Android Smart Lock Trusted Places

How to fix Android's Smart Lock Trusted Places feature

A 60-second workaround to make Android's location-based Smart Lock start working again.

Mobile security

The top 5 mobile security threats

When mixing personal and professional tasks on your smartphone, it's inevitable that someone is going to accidentally stumble onto malware. The SANS Institute's Chris Crowley has some advice on how to avoid trouble.

Take back your vacation with the help of Outlook's Automatic Replies

Connecting with work from the road? Here's how to stay safe

As more companies move to ban the use of public Wi-Fi networks by employees, here's a rundown of how to avoid man-in-the-middle attacks when traveling.

android security

Most Android devices lack latest security patches

Nearly three-quarters of Android devices on the five biggest U.S. carriers are running on security patches that are at least two months old, putting them at greater risk of being hacked.

p1200736

Google cites progress in Android security, but patching issues linger

The chances of you installing malware on your Android phone is incredibly small, according to Google.

secusuite for samsung knox 1

BlackBerry preps a more secure Samsung Galaxy S7

Secusmart, the BlackBerry subsidiary that secures the German Chancellor Angela Merkel's smartphone, will roll out a version of its SecuSuite security software compatible with Samsung Electronics' Knox platform later this year.

20160225 stock mwc ericsson booth security locks

How much are vendor security assurances worth after the CIA leaks?

Google, Apple, Microsoft and other software vendors are working to identify and patch the vulnerabilities described in the CIA leak, but ultimately this doesn't change the status quo of software security.

cog systems d4 secure htc a9 ip address

By virtualizing the Android OS, Cog Systems says it adds more security to smartphones

It sounds like a smartphone user's worst fear: Software that starts up before the phone's operating system, intercepting and encrypting every byte sent to or from the flash memory or the network interface. This is not some new kind of...

security light

25% off Kuna Smart Home Security Outdoor Light & Camera - Deal Alert

Night or day, Kuna’s smart outdoor security camera system detects movement at your door and sends actionable alerts to your mobile device, allowing you to safely take action using Kuna’s lights, HD live video feed, two-way intercom,...

security code big data cyberespionage DDoS

Windows Trojan hacks into embedded devices to install Mirai

Attackers have started to use Windows and Android malware to hack into embedded devices, dispelling the belief that if such devices are not directly exposed to the Internet they're less vulnerable.

Load More