If you use it, mobile malware will come
IT people who try to secure mobile devices in a big company face three big conceptual problems.
Kevin Fogarty | 07 Sep | Read more
IT people who try to secure mobile devices in a big company face three big conceptual problems.
Kevin Fogarty | 07 Sep | Read more
Take a deep breath. There's a new report out highlighting a <a href="http://bits.blogs.nytimes.com/2011/08/25/android-number-one-target-by-mobile-hackers-report-says/?nl=technology&emc=cta4">huge spike in threats against Google's Android platform</a>. Yes, it's something to be concerned about. But don't freak out or return your cool new Samsung Galaxy Tab.
Bill Snyder | 31 Aug | Read more
The U.S. Federal Communications Commission should take swift action to rule against the Bay Area Rapid Transit (BART) District's recent decision to shut down mobile phone service during a planned protest, several digital rights groups said Monday.
Grant Gross | 30 Aug | Read more
Photobucket has a cool mobile application that allows users to automatically upload mobile pictures to the company's photo-sharing website. That's something that Korey Heess is unlikely to forget anytime soon, after allegedly snapping a picture of himself that was used by police to identify him as a smartphone thief.
Robert McMillan | 24 Aug | Read more
So you’re thinking of jailbreaking your iOS device are you? The process of hacking your iDevice is simpler than ever but with so many different hardware, firmware, and software combinations out there, choosing the right jailbreak tool for your configuration for you can be a bit daunting if it’s your first time. Here’s a guide to picking the right tool for you.
Mike Keller | 24 Aug | Read more
Hoping to spark some entrepreneurial creativity in the Big Apple, online tools provider Aviary has organized a New York City event for developers to hack together new photo-based applications.
Joab Jackson | 18 Aug | Read more
A lot of the software written for Google's Android mobile phones falls short when it comes to user privacy and security.
Robert McMillan | 13 Aug | Read more
The rise of smartphones and tablets brings unprecedented mobility, but with the convenience of being able to carry and access information from virtually anywhere comes <a href="http://www.pcworld.com/businesscenter/article/237839/mobile_apps_fail_big_time_at_security_study_says.html">an increased threat</a> that attackers can also steal or access your information from virtually anywhere. AT&T announced today that it is taking proactive steps to strengthen mobile security by <a href="http://www.att.com/gen/press-room?pid=20619&cdvn=news&newsarticleid=32381&mapcode=enterprise|mk-enterprise-security">investing in a new mobile security platform</a>.
Tony Bradley | 12 Aug | Read more
A 10-year-old California hacker just figured out what a bunch of developers apparently couldn't: How to hack various mobile phone and tablet based games by simply fiddling with the clock. And she just told all at the first annual <a href="http://www.defconkids.org/">DefCon Kids</a> hacker conference—a subset of <a href="http://www.defcon.org/html/defcon-19/dc-19-index.html">DEFCON</a>, the self-identified "world's longest running and largest underground hacking conference"—which wrapped yesterday in Las Vegas.
Matt Peckham | 08 Aug | Read more
While 69 percent of organizations have employees <a href="http://www.csoonline.com/article/681822/just-say-yes-why-banning-consumer-devices-makes-your-organization-less-secure">using personal devices to connect to their corporate network</a>, more than one-fifth, or 21 percent, currently have no policy in place to govern the use of personal mobile devices on their network. These new figures, released recently from security-products firm <a href="http://www.csoonline.com/article/684895/password-management-systems-how-to-compare-and-use-them">Courion</a>, suggest many security leaders are still ignoring the need to address mobile-device management among their employees.
Joan Goodchild | 04 Aug | Read more
Using data collected from its Mobile Threat Network, Lookout today released a full report on the state of mobile malware and security. The report covers both Android and iOS, and compares the risks that both platforms face. You can view and download the full report on Lookout's blog, but here are a few of the highlights:
Armando Rodriguez | 04 Aug | Read more
Malicious software is leaping from PCs to cell phones, as malware makers target the platform in hopes of making a quick buck. Examples include the infected DroidDream and Plankton Android apps. An infected app released into the Android Market can infect several thousand users’ phones before anyone discovers the presence of the malware. Though the extent of Android malware has been overstated, it's best to learn now how to protect yourself and your data from attacks, instead of waiting until mobile malware becomes a more serious problem.
Armando Rodriguez | 30 Jul | Read more
Social engineers have been using various <a href="http://www.csoonline.com/article/480589/9-dirty-tricks-social-engineers-favorite-pick-up-lines">dirty tricks</a> to fool people for centuries. <a href="http://www.csoonline.com/article/596512/social-engineering-techniques-4-ways-criminal-outsiders-get-inside">Social engineering</a>, the art of <a href="http://www.csoonline.com/article/494464/social-engineering-5-security-holes-at-the-office-includes-video-">gaining access to buildings</a>, systems or data by exploiting <a href="http://www.csoonline.com/article/663329/social-engineering-3-examples-of-human-hacking">human psychology</a>, rather than by breaking in or using technical hacking techniques, is as old as crime itself and has been used in many ways for decades.
Joan Goodchild | 26 Jul | Read more
When typing in your sensitive information into a website, you know that pretty much every site always mask passwords. One reason for this is to stop people from snooping over your shoulder and stealing your logins. However, a security researcher has figured out a way of seeing past password masks.
Elizabeth Fish | 16 Jul | Read more
Fire up iTunes and grab the latest iOS update--unless you jailbroke your iPhone, iPad, or iPod Touch, that is. Apple released the iOS 4.3.4 update, which fixes a lovely PDF rendering bug that could allow someone with nefarious intents to take control of your iPhone. This particular flaw is also what <a href="http://www.pcworld.com/article/235144/jailbreakme_30_how_does_it_work.html">allowed for Jailbreak.me 3.0</a>, which finally brought a jailbreak to the iPad 2.
Nick Mediati | 16 Jul | Read more