Wireless / Mobile Security — News
Symantec Vision 2011 Sydney in pictures
App store vendors need to collaborate more closely to keep smartphone users safe, including putting together a system for grading application security, according to E.U. cybersecurity agency ENISA.
When you're in charge of a company's security, you have to actively seek out its weaknesses and then determine how to shore them up. That's what I've been up to lately, as an an offshoot of my efforts to harden the DMZ.
Security software firm AVG sought to put some more bones on the launch of the new version of its security software product in Prague this week, with the company focusing on mobility and industry initiatives to collectively tackle security threats.
When my cell phone started acting strange last week, I decided it was a good time to get a new one. I had several features in mind that I felt were essential, and the only phone I could find that had all of them was a Droid. Against my better judgment, I said I would take it.
Browser makers have generally been quick to react to the computer compromise at digital certificate issuer DigiNotar, but that hasn't been the case for all mobile phone makers.
IT people who try to secure mobile devices in a big company face three big conceptual problems.
Since the outbreak of civil unrest in the Middle East, we have seen an increased focus on the role played by social networking and mobility. When these two technologies are combined, the ability of a ‘flash mob’ to rally behind a single idea, or to a single location, has greatly increased.
A Melbourne-based app developer has spoken about the security pitfalls of smartphone apps, saying that while certain mobile environments are more susceptible to malware, such risks can be eliminated through encryption and using common sense.
As AVG Ambassador Tony Anscombe explained the rational behind some of the new features in AVG Internet Security 2012, released today, I couldn't help but think of the bouncer at one of my favourite local pubs.
Take a deep breath. There's a new report out highlighting a huge spike in threats against Google's Android platform. Yes, it's something to be concerned about. But don't freak out or return your cool new Samsung Galaxy Tab.
I thought we could examine a recent theme in a little more detail this month: the challenges of dealing with the consumerization of IT devices in the workplace. We recently completed a study, in partnership with Symantec, that looked at the security and compliance risks of a mobile workforce. It affirmed what I've believed for a long time, namely, that there is a consensus that mobile workers pose a great risk and that, for the most part, businesses are not prepared to mitigate that risk.
The U.S. Federal Communications Commission should take swift action to rule against the Bay Area Rapid Transit (BART) District's recent decision to shut down mobile phone service during a planned protest, several digital rights groups said Monday.
Android doesn't rival BlackBerry when it comes to security and enterprise support. But Android devices can still be reasonably secure. Here are some tips to help you protect your investment, privacy and data.
Four major credit card companies are working with the Isis mobile wallet venture to install mobile payment security applications on upcoming NFC-ready smartphones in the U.S.
This past week in security news was highlighted by a hacking revelation out of China, bad news for banks, good news for Sony gaming customers and a curious email that might have been at the heart of the big RSA data breach.
Sign up now »
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.