Blog Posts Tagged with "Mobile Devices"


Mobile Device Security in a BYOD World

January 29, 2013 Added by:Robert Siciliano

If you choose to use your personal device for employment purposes then your employer may take control over that device to protect themselves. In a company mobile liability policy, the employer often has remote capabilities to monitor activity and in the event of loss or employee termination wipe the data...

Comments  (0)


Mobile App Security Series: It’s 10pm. Do you know where your data is?

January 16, 2013 Added by:Brandon Knight

Mobile devices continue to pick up steam on becoming the primary device that many people use for email, web browsing, social media and even shopping. As we continue installing app after app which we then put our personal information in to the question is how secure are these apps?

Comments  (0)


All Aboard

December 17, 2012 Added by:Randall Frietzsche

We need a well-conceived set of administrative and technical controls - our policy, while still acknowledging that every living creature on the planet is organically attached to a smart device, must dictate that the user will follow the policy at risk of termination...

Comments  (0)


Mobile Devices get means for Tamper-Evident Forensic Auditing

December 13, 2012 Added by:Michelle Drolet

In order to detect security breaches and guarantee compliance, tamper “proofing” has not been sufficient. When it comes time for a forensic audit, the ability to detect unauthorized changes to digital files becomes invaluable in an investigation...

Comments  (0)


Lack of Security in Android Apps? That Could Be

December 02, 2012 Added by:Keith Mendoza

Have you ever installed an app in your Android phone and when you got to the permission screen you just couldn't justify to yourself why an app would require the permissions it's asking for?

Comments  (0)


How to turn any phone into a spy device with hardware hack

December 02, 2012 Added by:Pierluigi Paganini

Researcher Atul Alex has presented at the last edition of yhe International Malware Conference (MalCon) how it is possible to attack every mobile device with special hardware designed by using common electronic components...

Comments  (0)


Why You Should Care About Mobile Security: An Infographic

November 24, 2012 Added by:Fergal Glynn

No matter what you believe, you need to understand the security threats that come along with BYOD and how to best protect yourself and your business against them. Join Joe Worker and Joe IT as we walk you through the basics of BYOD and mobile security...

Comments  (2)


BYOD savings may be lost by security and admin costs

November 12, 2012 Added by:Rainer Enders

Companies need to mobilize, that is without question -- but for too long BYOD has become nearly synonymous with this effort. In reality, BYOD is just one of the ways enterprises can mobilize, and in many cases, it is not the most secure, or necessarily the most cost-efficient way to do so...

Comments  (0)


Security and Privacy Concerns for Mobile Devices

November 11, 2012 Added by:Dan Dieterle

BYOD (Bring your own Device) is one of the latest tech fads. Bring in that tablet or smart phone from home and we will hook it right up to our corporate network for you! What a great thing, and the IT staff just loves it too. But there are some serious concerns about mobile devices...

Comments  (0)


BYOD Costs are Rising

November 11, 2012 Added by:Bill Gerneglia

Recent research demonstrates some of the quantifiable benefits and complexities associated with allowing employees to use their own mobile devices on their employers' networks. Most organizations are now enabling BYOD in the enterprise...

Comments  (0)


F-Secure Mobile threat report Q3/2012, cyber threats in the ether

November 06, 2012 Added by:Pierluigi Paganini

The rapid diffusion of Android devices has had the effect of increasing the number of malware developed for the OS. During the third quarter 51,447 unique samples were detected. Google has tried to secure it’s OS with the introduction of an additional security layer named Bouncer...

Comments  (0)


Digital Forensics for Handheld Devices

November 05, 2012 Added by:Ben Rothke

An iPhone 5 with 64 GB of storage and the Apple A6 system-on-a-chip processor has more raw computing power entire data centers had some years ago. With billions of handheld devices in use , it is imperative that forensics investigators know how to ensure that the data in them can be preserved...

Comments  (0)


iPhone Mania and Your Corporate Security

November 01, 2012 Added by:Tripwire Inc

With the release of the iPhone 5 the proliferation of personal smart phones into the enterprise will get even faster. With projected sales between 5 and 8 million iPhones through the holidays you can guarantee that a fairly large percentage of them will be added to the burdens of the corporate network...

Comments  (1)


TrendMicro Q3 Security Report

October 24, 2012 Added by:Pierluigi Paganini

Trend Micro has released the 3Q 2012 SECURITY ROUNDUP that presents a worrying trend for malware growth which increased 483%. This includes cyber espionage malware and also destructive malicious agents targeting mainly the mobile world and in particular Google Android platform...

Comments  (0)


Mobile Security: Tips for Using Personal Devices at Work

October 08, 2012 Added by:Robert Siciliano

If you as an employee of a hospital use your personal device at work and also use it outside of work and it gets lost or stolen, then YES, you and the hospital would be in a great deal of hot water in the event that mobile device was lost...

Comments  (25)


New Mobile Security App for Android Smartphones

September 27, 2012 Added by:Robert Siciliano

As more online retailers introduce mobile e-commerce applications, criminal hackers are taking notice. Existing mobile operating systems are under attack and, like standard PC operating systems, they sometimes fail to provide the necessary security to support a payment application...

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »
Most Liked