The Android version of WhatsApp--the instant messaging firm being acquired by Facebook for $16 billion--has a security flaw that leaves chat histories open to theft and decryption by malicious apps installed on the same smartphone, warns an article in Ars Technica.
The "dark web" malware industry is behind the growing attacks on point-of-sale systems operated by leading retailers, including the high profile attack against Target, says McAfee Labs.
A majority of enterprises surveyed by Infonetics Research said that they are deploying mobile device security products in order to "effectively handle mobile application control and mixed personal and business use."
I saw a disturbing survey today that was carried out by Vision Critical on behalf of security firm Absolute Software. The survey finds that one-quarter of enterprise workers do not think that data security is their responsibility and that they should face no punishment if they lose sensitive corporate data.
SAN FRANCISCO--Is there an enterprise security perimeter anymore? That was one of the questions tackled by a panel of CISOs and IT execs at the RSA Conference last week.
The worldwide mobile biometrics market is forecast by TechNavio to surge at a 157 percent compound annual growth rate through 2018, fueled by the increasing use of mobile devices for financial transactions.
Virtual security appliances are displacing security hardware in the enterprise network, concludes Michela Menting, ABI Research's senior analyst in cybersecurity.
IT leaders are not concerned about unknown security threats generated by BYOD, mobility, cloud computing and Internet usage, according to a survey of 1,440 global IT leaders by Vanson Bourne on behalf of Dell.
Cloud and BYOD are fueling demand for strong authentication and one-time password products. This demand is expected to boost the market for these products by nearly seven percent per year to $2.2 billion in 2018, according to market research firm Frost & Sullivan.
As Android devices make their way into the enterprise through BYOD, vulnerabilities in the operating system become more of an IT security threat.