To encourage IT security researches to root out mobile app vulnerabilities, Google is expanding its bug bounty program to include vulnerabilities in mobile apps, wrote Eduardo Vela Nava, security engineer at Google, in a blog post.
In the race to get enterprise customers, mobile security vendors can differentiate themselves by offering top-notch customer service, argued Denise Culver in a Light Reading article.
Employees at critical infrastructure firms are not just connecting their laptops and mobile phones to the corporate network from home, they are also connecting Internet of Things devices residing on their home network to the corporate network.
A security flaw in Verizon's FiOS service exposed email accounts of Verizon customers to hijacking, reports Security Week.
Mobile malware known as DeathRing is being pre-loaded on factory-shipped smartphones destined for the Asian and African markets, indicating that the mobile handset supply chain has been compromised.
Most IT pros surveyed by the Ponemon Institute believe that negligent and careless employees pose the biggest threat to endpoint security in the enterprise.
Google has decided to stop patching vulnerabilities in WebView, which renders webpages on Android devices, for older versions of Android that make up 60 percent of Android devices in use, according to a blog post by Tod Beardsley of Metasploit.
In an era when PCs were the primary endpoint in the enterprise, chief information security officers (CISOs) can no longer take a "set it and forget it" approach to endpoint security, cautions Jon Oltsik, senior principal analyst at the Enterprise Strategy Group.
Android mobile devices are the choice of many employees bringing their personal devices into the workplace. So the security of those devices is upper most in the minds of IT security pros. Yet some critical Android vulnerabilities identified in 2013 and last year still pose risks.
IT security types prefer Apple devices because of their reputation for strong security, but the recent discovery of the Thunderstrike bootkit could call into question that security reputation.