Tag:

Mobile Security

Latest Headlines

Latest Headlines

Employers: 'BYOD' means you're on 'your own'

It's no surprise that a growing number of organizations are allowing BYOD practices. But along with that acceptance is a firm stand that the employee is then on his own, new research confirms.

Rise in mobile threats prompts more operator investment in mobile infrastructure security

As security threats to mobile devices and mobile data increase, mobile operators are beginning to invest heavily in securing their mobile infrastructures.

iOS 8: What's good for openness might be bad for security

Apple's new mobile operating system, iOS 8, allows more access to the system's features, but this could allow hackers greater access as well.

'Yo', your app has been hacked

The recently launched mobile app Yo, which allows users to send the word "Yo" to friends' smartphones, was hacked by three students from Georgia Tech University, TechCrunch reports.

Infographic: Employees admit to flaunting policies prohibiting BYOD

Two-thirds of employees who have personal smartphones admit to accessing corporate data from those devices, and 20 percent of those admit to doing so even though there was a company policy prohibiting BYOD, according to data in an infographic compiled by cloud and mobile security firm Bitglass.

Nokia paid millions in ransom to stop release of Symbian OS encryption key

In a plot right out of a crime thriller, Nokia put millions of euros in a bag and left it at a parking lot near an amusement park as ransom to stop the release of the encryption key for its Symbian-based smartphones in 2007, MTV News in Finland reports.

Apple iOS and Android security worries the same, yet different

Take your pick: Apple  iOS or Android. Either one is a risky proposition, but they expose users to different security threats, a new study finds.

Security pros need to adapt to consumerization of IT or perish

As enterprises increasingly adopt technologies prevalent in the consumer marketplace, security pros will need to adapt along with their organizations or look for another line of work.

The NSA, PRISM and Edward Snowden: A year-in-review timeline

It's been a year since whistleblower Edward Snowden, and the top-secret programs he brought to light, became part of our everyday news and vocabulary. As we reach this one-year anniversary,  FierceITSecurity  has compiled a timeline of some of the key events (including links to documents and articles) from the past year.

Gartner: Most mobile security breaches will be caused by misconfigured apps by 2017

As the focus of endpoint breaches will shift from PCs and laptops to tablets and smartphones, three-quarters of mobile security breaches will be the result of a misconfigured mobile app by 2017, predicts Gartner.