Wireless / Mobile Security — News

Symantec Vision 2011 Sydney in pictures

By Neerav Bhatt | 13 September, 2011 18:56

Symantec Vision 2011 Sydney in pictures

App stores should cooperate to improve smartphone security

By Mikael Ricknäs | 13 September, 2011 22:48

App store vendors need to collaborate more closely to keep smartphone users safe, including putting together a system for grading application security, according to E.U. cybersecurity agency ENISA.

Using remote access securely

By Joan Goodchild | 13 September, 2011 06:17

A data-breach-investigations report issued by Verizon earlier this year found 71 percent of all hacking attacks on business take place using remote access or desktop service.

Security Manager's Journal: Assessing Web-facing apps

By Mathias Thurman | 13 September, 2011 01:37

When you're in charge of a company's security, you have to actively seek out its weaknesses and then determine how to shore them up. That's what I've been up to lately, as an an offshoot of my efforts to harden the DMZ.

AVG calls for action on mobile and cloud services security

By Antony Savvas | 09 September, 2011 19:07

Security software firm AVG sought to put some more bones on the launch of the new version of its security software product in Prague this week, with the company focusing on mobility and industry initiatives to collectively tackle security threats.

Blinded by the smartphone glitz: Is security on your must-have features list?

By Ira Winkler | 09 September, 2011 02:33

When my cell phone started acting strange last week, I decided it was a good time to get a new one. I had several features in mind that I felt were essential, and the only phone I could find that had all of them was a Droid. Against my better judgment, I said I would take it.

Gmail Without Web Access, Too Much Security

By Rick Broida | 08 September, 2011 02:42

It's that time again--reader Q&A time, that is. This week I answer questions on getting to Gmail messages when you don't have Internet access and how much security software is too much.

DigiNotar certificates are pulled, but not on smartphones

By Robert McMillan | 07 September, 2011 18:17

Browser makers have generally been quick to react to the computer compromise at digital certificate issuer DigiNotar, but that hasn't been the case for all mobile phone makers.

If you use it, mobile malware will come

By Kevin Fogarty | 07 September, 2011 05:38

IT people who try to secure mobile devices in a big company face three big conceptual problems.

Mobility & Social Media technologies combine lead to Governement jitters

By Rob Forsyth | 05 September, 2011 13:04

Since the outbreak of civil unrest in the Middle East, we have seen an increased focus on the role played by social networking and mobility. When these two technologies are combined, the ability of a ‘flash mob’ to rally behind a single idea, or to a single location, has greatly increased.

Mobile apps and security: What you need to know

By Lisa Banks | 02 September, 2011 17:16

A Melbourne-based app developer has spoken about the security pitfalls of smartphone apps, saying that while certain mobile environments are more susceptible to malware, such risks can be eliminated through encryption and using common sense.

AVG 2012: your local pub bouncer made digital

By Stilgherrian | 01 September, 2011 16:45

As AVG Ambassador Tony Anscombe explained the rational behind some of the new features in AVG Internet Security 2012, released today, I couldn't help but think of the bouncer at one of my favourite local pubs.

Android Devices Exposed: 7 Ways to Thwart Hackers

By Bill Snyder | 31 August, 2011 02:05

Take a deep breath. There's a new report out highlighting a huge spike in threats against Google's Android platform. Yes, it's something to be concerned about. But don't freak out or return your cool new Samsung Galaxy Tab.

Risky workers

By Bob Bragdon | 31 August, 2011 02:09

I thought we could examine a recent theme in a little more detail this month: the challenges of dealing with the consumerization of IT devices in the workplace. We recently completed a study, in partnership with Symantec, that looked at the security and compliance risks of a mobile workforce. It affirmed what I've believed for a long time, namely, that there is a consensus that mobile workers pose a great risk and that, for the most part, businesses are not prepared to mitigate that risk.

Nokia developer forum hacked, still unavailable

By John Ribeiro | 30 August, 2011 15:24

The community section of Nokia's developer site was hacked, and some member's e-mail addresses have been accessed, the mobile phone maker said.

Groups ask FCC to rule against BART's mobile phone shutdown

By Grant Gross | 30 August, 2011 05:42

The U.S. Federal Communications Commission should take swift action to rule against the Bay Area Rapid Transit (BART) District's recent decision to shut down mobile phone service during a planned protest, several digital rights groups said Monday.

Tips and tricks for protecting Android devices

By Eric Geier | 29 August, 2011 13:59

Android doesn't rival BlackBerry when it comes to security and enterprise support. But Android devices can still be reasonably secure. Here are some tips to help you protect your investment, privacy and data.

Mobile payment security apps coming to NFC-ready smartphones

By Matt Hamblen | 26 August, 2011 21:43 | 1 Comment

Four major credit card companies are working with the Isis mobile wallet venture to install mobile payment security applications on upcoming NFC-ready smartphones in the U.S.

IT security rundown for week ending Aug. 26

By Ellen Messmer | 27 August, 2011 05:39

This past week in security news was highlighted by a hacking revelation out of China, bad news for banks, good news for Sony gaming customers and a curious email that might have been at the heart of the big RSA data breach.

Android users hit by lethal Trojan root hack

By John E Dunn | 24 August, 2011 23:43

Researchers have publicised probably the most dangerous Android malware examples yet discovered, a Trojan that exploits the GingerBreak root hack (CVE-2011-1823) in Android 2.3 that gained wide publicity after its discovery in April.

CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Web Security and Control

Protect your users on the web

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).

  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.