Tag:

Mobile Security

Latest Headlines

Latest Headlines

Google adds mobile apps to its bug bounty program

To encourage IT security researches to root out mobile app vulnerabilities, Google is expanding its bug bounty program to include vulnerabilities in mobile apps, wrote Eduardo Vela Nava, security engineer at Google, in a blog post.

Mobile security vendors should deliver customer service with a smile

In the race to get enterprise customers, mobile security vendors can differentiate themselves by offering top-notch customer service, argued Denise Culver in a Light Reading article.

Many connect home-based IoT devices to corporate network despite risks

Employees at critical infrastructure firms are not just connecting their laptops and mobile phones to the corporate network from home, they are also connecting Internet of Things devices residing on their home network to the corporate network.

Spotlight: Researcher uncovers security flaw in Verizon's FiOS service

A security flaw in Verizon's FiOS service exposed email accounts of Verizon customers to hijacking, reports Security Week.

Hackers pre-loading DeathRing on factory-shipped smartphones

Mobile malware known as DeathRing is being pre-loaded on factory-shipped smartphones destined for the Asian and African markets, indicating that the mobile handset supply chain has been compromised.

Employees pose biggest threat to the security of corporate endpoints

Most IT pros surveyed by the Ponemon Institute believe that negligent and careless employees pose the biggest threat to endpoint security in the enterprise.

Spotlight: 60% of Android users are out of luck when it comes to WebView security hole

Google has decided to stop patching vulnerabilities in WebView, which renders webpages on Android devices, for older versions of Android that make up 60 percent of Android devices in use, according to a blog post by Tod Beardsley of Metasploit.

The days of a 'set it and forget it' approach to endpoint security are over, says ESG

In an era when PCs were the primary endpoint in the enterprise, chief information security officers (CISOs) can no longer take a "set it and forget it" approach to endpoint security, cautions Jon Oltsik, senior principal analyst at the Enterprise Strategy Group.

Patched Android vulnerabilities still pose security risks

Android mobile devices are the choice of many employees bringing their personal devices into the workplace. So the security of those devices is upper most in the minds of IT security pros. Yet some critical Android vulnerabilities identified in 2013 and last year still pose risks.

Thunderstrike bootkit further erodes Apple's reputation for rock-solid security

IT security types prefer Apple devices because of their reputation for strong security, but the recent discovery of the Thunderstrike bootkit could call into question that security reputation.