Most popular

News about wireless
  • IBM claims new patent for mobile security technology

    By Ellen Messmer | 09 April, 2014 00:22

    IBM has come up with a technology for reducing the risk of data being exposed in mobile push notifications to mobile devices by coming up with a way to encrypt that information so service providers and others can't actually see any data related to the user's mobile device.

  • Android social apps slated for sending 'growth hacking' spam

    By John E Dunn | 04 April, 2014 23:51

    Mobile security firm AdaptiveMobile has named and shamed a clutch of popular Android apps it believes have been using the ‘growth hacking' technique to spam large volumes of invitations to the contacts database of installed users.

  • Google cracks whip to stop Android Play store apps abusing users

    By John E Dunn | 01 April, 2014 05:10

    Google has once again tightened restrictions on the acceptable behaviour of Android apps distributed through the Play store, narrowing promotional design, forcing in-app payments to be made clearer, and widening the definition of spyware to catch abuse.

  • 8 ways to improve wired network security

    By Eric Geier | 17 March, 2014 11:59

    We sometimes focus more on the wireless side of the network when it comes to security because Wi-Fi has no physical fences. After all, a war-driver can detect your SSID and launch an attack while sitting out in the parking lot.

  • Snowden revelations raise interest in smartphone spyware for business

    By Matt Hamblen | 13 March, 2014 19:12

    As the world still reels over reports of U.S. government surveillance of privately owned smartphones, a spyware industry is growing that's focused on helping employers monitor the ways smartphones and tablets are used by their workers. Parents are also interested in the service to track their children's smartphone use.

Tutorials about wireless
Features about wireless
  • 12 hot US security start-ups to watch

    By Ellen Messmer | 13 November, 2013 13:23

    Going into 2014, a whirlwind of security start-ups are looking to have an impact on the enterprise world. Most of these new ventures are focused on securing data in the cloud and on mobile devices. Santa Clara, California-based Illumio, for example, founded earlier this year, is only hinting about what it will be doing in cloud security. But already it's the darling of Silicon Valley investors, pulling in over $42 million from backer Andreesen Horowitz, General Catalyst, Formation 8 and others.

  • Tips for testing your mobile app security

    By Michelle Drolet, founder of Towerwall | 20 June, 2013 22:35

    The enterprise has gone mobile and there's no turning back. And while the BYOD movement has received plenty of attention, IT departments are getting a handle on the security risks of personal mobile devices in the workplace. The next challenge is "bring your own application" (BYOA), because many public app stores have serious malware problems.

  • 8 essential features you need in a business router

    By Eric Geier | 17 May, 2013 15:56

    A router is the heart of your network, so it deserves to be chosen carefully. Any router will share your Internet connection amongst your computers and other networkable devices (smartphones, tablets, and so on), but better models provide features that will enhance your network and its performance. Whether you're seeking a business- or consumer-class router, here are the eight most essential features to look for.

  • Tech Titans Talk: The IDG Enterprise Interview Series

    By CIO | 17 May, 2013 14:15

    In the IDG Enterprise Interview Series, you'll hear from technology CIOs and CEOs on today's burgeoning trends, ongoing headaches and upcoming product plans. Check out this informative series from IDG Enterprise Chief Content Officer John Gallant and his team of editors.

  • Kenneth van Wyk: The good and bad of Android and iOS

    By Kenneth van Wyk | 30 October, 2012 20:44

    Both Google's and Apple's mobile platforms have security drawbacks and advantages. Is there a clear winner?

Whitepapers about wireless

CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Sophos Mobile Control

Data protection, policy compliance and device control for mobile devices

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.