Android security audit: An 11-step checklist

Read JR Raphael’s 11-step checklist for businesses to protect their Android smartphone/tablets on Computer Weekly : Android security is always a hot topic on these here Nets of Inter — and almost always for the wrong reason. As we’ve discussed ad nauseam over the years, most of the missives you read about this-or-that super-scary malware/virus/brain-eating-boogie-monster are overly […]

How to secure a wireless network and thwart growing threats

Read Craig Mathias’ checklist for mobile security on Tech Target : Mobile security — as with most aspects of network security — is a process and not a goal. Threats continue to evolve, as do the tools enterprises can harness to meet those threats. As a result, it’s essential that an organization’s mobile security process remains […]

IoT can learn from smartphone security

Read Jack Gold explain how the Internet of Things manufacturers can learn about cyber security from smartphone security on Network World : The massive growth of Internet of Things (IoT) devices over the next one to three years should give us pause. As companies rush to get to market first, are we seeing a “dumbing […]

Mobile Phishing Attacks Jump, Financial Industry Is Biggest Target

That’s why the number of breaches continues to grow each year, and one of the methods in which they’re accomplished is through phishing. In a new report released by PhishLabs, data from Q1 to Q2 in 2017 shows a staggering rise, and the likelihood that it will slow down is slim. Read about the new […]

Tech Brief: Advancing mobile technologies without sacrificing security

The intensely personal relationship users have with smart mobile devices —essentially handheld supercomputers —presents a new combination of challenges for government and enterprise CIOs and IT security managers. Read about the tech brief which has tips about making mobile devices more made secure than on-premises devices on FedScoop.

Data analytics, cybersecurity and mobile technology among the top 10 challenges for health executives in 2018

Health IT is evidently top of mind for healthcare executives going into 2018. Data analytics, cybersecurity and harnessing mobile health technology were listed among the top 10 challenges for executives, according to a survey by the Healthcare Executive Group. Read about the new survey by Healthcare Executive Group which reveals that Data analytics, cybersecurity and mobile technology […]

IoT can learn from smartphone security

Read  Jack Gold’s article about how Internet of Things can learn from smartphone security on Network World : The massive growth of Internet of Things (IoT) devices over the next one to three years should give us pause. As companies rush to get to market first, are we seeing a “dumbing down” of basic device […]

Report: Android cybersecurity attacks up 40%, here are the top 3 threats

According to new research from Avast, released Monday, cyberattacks against Android smartphones and tablets are up 40%, year-over-year from Q2 2016. Typically, this averages about 1.2-1.7 million attacks per month, a press release said. Read about the new report from Avast which reveals that  cybersecurity threats against Android devices are up 40 percent over last year […]

What is the future of mobile security

Read why  Isaac Daniel says that the Internet of Things and connected devices pose a serious security threat to modern organisations IT Pro Portal : In the past 20 years, we have seen a boom in mobile adoption and the arrival of the Internet of Things, but recently, these advancements have been overshadowed by cybersecurity attacks […]

Gaming apps ‘main source’ of mobile phishing attacks, research shows

Gaming apps are the most likely source of phishing attacks on corporate devices, according to research by mobile security firm Wandera. Read more about the new report by Wandera which reveals that gaming (25.6%)  and email apps (18.9%) as most likely to be hacked by cyber criminals on Computer Weekly.