Qualcomm today announced a biometric sensor it developed that can read the 3D characteristics of fingerprints through a phone's display, according to a release from the company. The tech could be a potential boon for an IT security market clamoring for sensitive and scalable biometrics.
More and more enterprises begin to deploy Internet of Things devices and platforms to improve efficiency and reduce costs. Yet these same IoT objects can open up the enterprise to security threats, with every device becoming a potential entry point for attackers.
Alohar Mobile has received a patent for a system that would use the sensors in mobile phones to create a "fingerprint" of the way you walk, using the data for authentication purposes.
BYOD can be a boon for employee productivity and satisfaction, but it can be a bust for IT departments struggling to protect the corporate network from risks introduced by all of the BYOD devices.
An attacker could exploit security holes in Google Play and Android Web browsers to gain remote control of Android smartphones, warned Tod Beardsley with security firm Rapid7.
Researchers uncover new iOS spyware designed to attack non-jailbroken iOS devices to record audio, take screen shots, and steal personal data.
CIOs and IT security pros are concerned about the security risks that millions of Internet of Things devices can pose to their networks and equipment. To address these security concerns, Verizon Enterprise Solutions rolled out last week a managed certificate security service for enterprises to authenticate IoT devices, reported Larry Dignan with ZDNet.
To encourage IT security researches to root out mobile app vulnerabilities, Google is expanding its bug bounty program to include vulnerabilities in mobile apps, wrote Eduardo Vela Nava, security engineer at Google, in a blog post.
In the race to get enterprise customers, mobile security vendors can differentiate themselves by offering top-notch customer service, argued Denise Culver in a Light Reading article.
Employees at critical infrastructure firms are not just connecting their laptops and mobile phones to the corporate network from home, they are also connecting Internet of Things devices residing on their home network to the corporate network.