The future of smartphone security: Hardware isolation

Mobile spyware has become increasingly more ubiquitous in corporate networks and devices. In a 2017 study, Check Point has found that out of the 850 organizations that they queried, 100% had experienced a mobile malware attack at least once in the past. To date, most cybersecurity companies have focused either on software-only or built-in hardware […]

Google wipes out over 700,000 Android Apps from Google Play Store using AI

Android Apps are one way in which malicious Apps can enter your smartphone and steal your personal and financial data. You invariably trust an App which has come directly from Google engineers vouched official play store. But you may be wrong because it is impossible for Google to vouch for all the apps. However, Google undertakes […]

Mobile Device Makers Increasingly Embrace Bug Bounty Programs

With the rise of mobile threats and ubiquitous use of smartphones, mobile device makers are increasingly throwing their resources toward bug bounty programs to shore up the security of the devices. Samsung, which holds the largest market share for Android devices, launched a bug bounty program earlier this year, offering up to $200,000 per vulnerability discovered, depending on its severity. It […]

Android security audit: An 11-step checklist

Read JR Raphael’s 11-step checklist for businesses to protect their Android smartphone/tablets on Computer Weekly : Android security is always a hot topic on these here Nets of Inter — and almost always for the wrong reason. As we’ve discussed ad nauseam over the years, most of the missives you read about this-or-that super-scary malware/virus/brain-eating-boogie-monster are overly […]

How to secure a wireless network and thwart growing threats

Read Craig Mathias’ checklist for mobile security on Tech Target : Mobile security — as with most aspects of network security — is a process and not a goal. Threats continue to evolve, as do the tools enterprises can harness to meet those threats. As a result, it’s essential that an organization’s mobile security process remains […]

IoT can learn from smartphone security

Read Jack Gold explain how the Internet of Things manufacturers can learn about cyber security from smartphone security on Network World : The massive growth of Internet of Things (IoT) devices over the next one to three years should give us pause. As companies rush to get to market first, are we seeing a “dumbing […]

Mobile Phishing Attacks Jump, Financial Industry Is Biggest Target

That’s why the number of breaches continues to grow each year, and one of the methods in which they’re accomplished is through phishing. In a new report released by PhishLabs, data from Q1 to Q2 in 2017 shows a staggering rise, and the likelihood that it will slow down is slim. Read about the new […]

Tech Brief: Advancing mobile technologies without sacrificing security

The intensely personal relationship users have with smart mobile devices —essentially handheld supercomputers —presents a new combination of challenges for government and enterprise CIOs and IT security managers. Read about the tech brief which has tips about making mobile devices more made secure than on-premises devices on FedScoop.

Data analytics, cybersecurity and mobile technology among the top 10 challenges for health executives in 2018

Health IT is evidently top of mind for healthcare executives going into 2018. Data analytics, cybersecurity and harnessing mobile health technology were listed among the top 10 challenges for executives, according to a survey by the Healthcare Executive Group. Read about the new survey by Healthcare Executive Group which reveals that Data analytics, cybersecurity and mobile technology […]

IoT can learn from smartphone security

Read  Jack Gold’s article about how Internet of Things can learn from smartphone security on Network World : The massive growth of Internet of Things (IoT) devices over the next one to three years should give us pause. As companies rush to get to market first, are we seeing a “dumbing down” of basic device […]