Blog Posts Tagged with "Mobile Security"

E595c1d49bf4a26f8e14ce59812af80e

VPNs and Common-Sense Policies Make BYOD Safer

April 15, 2013 Added by:Patrick Oliver Graf

One drawback of BYOD is that each mobile operating system comes with its own architecture and security concerns. Any company that embraces BYOD and mobile technologies must account for the different platforms its employees use to complete work-related functions.

Comments  (1)

37d5f81e2277051bc17116221040d51c

2013 SXSWi Security Trends in Technology

April 10, 2013 Added by:Robert Siciliano

At the SXSWi conference this year, mobile was a big deal—which meant mobile applications and their security are high on developers’ radars.

Comments  (0)

00c83c62ef65f17ce8e790850c596964

Secure Now or Forever...

February 24, 2012 Added by:Pamela Gupta

Traditional access control is simple, but permission-based access has become challenging – applications that request the user’s permission to access sensitive data explicitly. We are expecting users to be system administrators without adequate training, which is not feasible...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

AdiOS: Say Goodbye to Nosy iPhone Apps

February 16, 2012 Added by:Fergal Glynn

I put together a free utility called AdiOS (Addressbook Detector for iOS) that lets Mac users scan the iOS apps in your iTunes directory to see if they have the potential to dump your phone book externally. AdiOS detects apps that access your address book using a binary grep...

Comments  (0)

1b061b1cec6b5898e5326992d9461610

Security: Failing Gracefully, or Just Failing?

February 01, 2012 Added by:Dave Shackleford

We’re pretty good at if-then analysis for controls in security. Let’s turn it around though and start thinking if-then in the negative sense. Prevention tools and processes need to fail gracefully and lead us into detection and response mode...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Sophos Releases Security Threat Report 2012

January 26, 2012 Added by:Infosec Island Admin

Sophos unveiled its latest Security Threat Report 2012, a detailed assessment of the threat landscape—from hacktivism and online threats to mobile malware, cloud computing and social network security, as well as IT security trends for this coming year...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Mobile Application Security: New Platforms, Old Mistakes

January 24, 2012 Added by:Fergal Glynn

While Android may be a new platform, some of the security issues we found are reminiscent of old mistakes we have seen developers make. One example of this was the practice of hard-coding cryptographic keys directly into the application...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Necessary Security Updates for 2012

January 24, 2012 Added by:Robert Siciliano

Never before have so many criminals been so organized across borders as they are today. The Internet has spawned international crime syndicates of the best criminal minds who seek to take from you, your government, and all the merchants we rely on to provide products and services...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Security Beyond the Desktop

January 19, 2012 Added by:Robert Siciliano

The human link: There is an ever-widening disparity between the sophistication of networks and the people who use them. When direct attacks on an organization’s defenses fail, cybercriminals often use social engineering toolkits to exploit unsuspecting employees...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Significance of 'Death of the Document Web' to Security

January 18, 2012 Added by:Rafal Los

Infosec pros just started getting comfy with profiling, analyzing, and defending web-based apps from a server, consumed by a human, and used in a browser. Hang on tight because the world just took a sharp left and if you're not buckled in you're bound to be thrown from the bus...

Comments  (2)

68b48711426f3b082ab24e5746a66b36

Mobile Security: Android vs. iOS - An Infographic

January 12, 2012 Added by:Fergal Glynn

With the dominance of iOS and the rising popularity of Android devices in the mobile marketplace, the security of these devices is a growing concern. This infographic examines the security features of Android and iOS, and also takes a look at their strengths and weaknesses...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Five Biggest Security Events of 2011

December 16, 2011 Added by:Headlines

"Sony went out of its way to keep customers in the dark for the majority of the outage and when it did address the issue, it presented misinformation and blamed everyone but itself..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Top Seven Emerging Security Trends from 2011

December 15, 2011 Added by:Headlines

Issues gaining attention over the past year include the weakening of the digital certificate authorities, surges in malware targeting mobile devices, designer malware, and the rash of corporate network breaches - be they by hacktivists, nation-state supported hackers, or criminal syndicates...

Comments  (0)

Aecf1189abe745df32ec68f5864649a6

Fraudsters Defeat Poor Risk Management - Not Two-Factor Authentication

December 08, 2011 Added by:Nick Owen

Carriers are not incentivized to secure their users accounts. SMS is really just an email sent to a phone over a provider that barely cares about security. 99% of SMS messages don't require security so don't expect the carriers to add any soon...

Comments  (0)

Fe3139b2aae983885565da7757da08a8

Android Apps Violate Permissions - But Who Cares, Right?

December 06, 2011 Added by:Ed Moyle

These guys built a tool called "woodpecker" that snakes around inside popular Android phone platforms looking for places where the phone is configured so as to violate the Android permission enforcement model. Go read it - you'd be surprised what they've found...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Mobile App Makers Must Protect Children’s Privacy

December 05, 2011 Added by:Kelly Colgan

Mobile applications do much more than entertain, inform, or otherwise make life more convenient. Depending on the app, companies can access private information as varied as phone and email contacts, call logs, calendar data, and data about the device, and therefore our location...

Comments  (0)

Page « < 1 - 2 - 3 > »