Tag:

Mobile Security

Latest Headlines

Latest Headlines

News Scan: More to rugged tech development than meets the eye; Nvidia offers more detail about new 64-bit processor, Denver; more

Read the hottest MobileIT news for Wednesday, August 13, including what's more to rugged tech development, Nvidia's detail release on Project Denver, advice for T-Mobile to take Illiad seriously, Lookout Mobile Security's eyes on the enterprise and SeaWorld's CIO on mobile app development.

Windows tech support scams move onshore

Many early attempts at 'Windows tech support' scams--with a caller telling the victim that their computer is sending out tech support requests--had a lower success rate because U.S. targets were put off by the heavily accented English of offshore scammers.

Like Vegas in August, mobile security is hot at Black Hat

Mobile security is a hot topic at the Black Hat security conference being held this week in Las Vegas. I am here at Black Hat and will be sharing mobile security insights with you in the coming days.

Spotlight: Apple says iPhone 'backdoors' are diagnostic services

Apple is defending the undocumented services resident on iOS devices, which security researcher Jonathan Zdziarski says can be used as a backdoor to sensitive data, as a diagnostic tool for enterprise IT departments, developers and AppleCare service personnel.

Backdoors in iPhones could give NSA, hackers access to sensitive data, says researcher

Apple has inserted backdoors into iPhones that could enable an unauthorized person to harvest pictures, text messages and other sensitive data from the device without the user's knowledge, Jonathan Zdziarski, an iOS jailbreaker and forensic expert, told attendees of the Hope X conference held in New York over the weekend.

Scams that take over smartphones for cryptocurrency mining just not worth it

Scammers who take over smartphone processors can use them to mine for bitcoins, and they can generate a good amount of value too--if they commandeer more than 14 million devices. That's the number of Galaxy S3s needed to mine a single bitcoin in one day, according to a blog post from cybersecurity firm Lookout.

Infographic: 6 success factors for a BYOD program

Companies are struggling to deal with the flood of personal devices coming into workplace. Here are six success factors from cloud and mobile security provider Bitglass that IT managers should keep in mind when crafting a BYOD program.

And the number one security threat to your home is... a light bulb!

Watch out. It appears that one of the gravest security threats to your home is not stealthy burglar but a connected light bulb.

Mobile payment malware infections are on the rise, warns Cheetah Mobile

The number of daily infected users worldwide climbed from below 12,000 in May to more than 16,000 at the end of June.

Spotlight: Android flaw enables hackers to make rogue phone calls

Most Android devices suffer from a security flaw that enables malware to make unauthorized phone calls, disrupt calls and execute codes that can access device functions and other unauthorized actions, warns IDG News Service.