Mobile Security

Latest Headlines

Latest Headlines

Is the security perimeter gone? IT execs weigh in

SAN FRANCISCO--Is there an enterprise security perimeter anymore? That was one of the questions tackled by a panel of CISOs and IT execs at the RSA Conference last week.

Mobile device use for financial transactions to spur red hot mobile biometrics market

The worldwide mobile biometrics market is forecast by TechNavio to surge at a 157 percent compound annual growth rate through 2018, fueled by the increasing use of mobile devices for financial transactions.

Virtual appliances displace hardware in enterprise network security

Virtual security appliances are displacing security hardware in the enterprise network, concludes Michela Menting, ABI Research's senior analyst in cybersecurity.

IT leaders indifferent to unknown threats generated by mobile, cloud technology

IT leaders are not concerned about unknown security threats generated by BYOD, mobility, cloud computing and Internet usage, according to a survey of 1,440 global IT leaders by Vanson Bourne on behalf of Dell.

Cloud, BYOD to boost demand for strong authentication products

Cloud and BYOD are fueling demand for strong authentication and one-time password products. This demand is expected to boost the market for these products by nearly seven percent per year to $2.2 billion in 2018, according to market research firm Frost & Sullivan.

More than two-thirds of Androids susceptible to exploit that can give attacker control of device

As Android devices make their way into the enterprise through BYOD, vulnerabilities in the operating system become more of an IT security threat.

Spotlight: BlackBerry plugs security hole in BES 10

While everyone was watching what fixes Microsoft had for Patch Tuesday, BlackBerry issued its own security advisory on Tuesday to plug a security hole in BlackBerry Enterprise Service 10, the Universal Device Service 6 and BES 5.

California wants kill switches on all mobile devices

California lawmakers introduced a bill that would require a "kill switch" for every mobile smartphone or tablet sold in the state.

Could a driverless car be hijacked by a hacker?

At the CES International this year, BMW and Audi proudly demonstrated driveless cars that can steer, brake and throttle autonomously using sensors. What they failed to discuss was whether their driveless cars were vulnerable to hijacking by a hacker.

Many IT pros turning to NAC for mobile security

More than three-quarters of IT pros are using or planning to use network access control technology to improve mobile security, according to a survey of more than 750 IT pros by CyberEdge Group on behalf of NAC vendor ForeScout Technologies and eight other IT security firms.