mobile devices
![Google Hands](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113551/google_hands_free-400x200.png)
Google Hands Free entering the mobile payments game
Google has announced that it is testing its new payment app, Hands Free, which (as the name suggests) allows users to make payments without the need to use their hands, mobile …
![Wireless](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195303/wireless-green-400x200.png)
A rogue access point at RSA Conference? Here’s what happened
Ever since businesses began to offer Wi-Fi access to customers, experts have warned that open hotspots are not secure. Open Wi-Fi hotspots don’t ask a user for a …
![mobile fingerprint hack](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113722/mobile-fingerprint-hack-400x200.png)
Hack a mobile phone’s fingerprint sensor in 15 minutes
Two researchers from Michigan State University’s biometrics group have devised a method for hacking mobile phone’s fingerprint authentication by using just a color …
![Porn clicker](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114048/pornclicker-400x200.jpg)
Porn Clicker Android malware hits Google Play hard
In a little over seven months, cybercriminals using click-jacking mobile malware to earn affiliate income have managed to push over 340 instances of the malware into Google …
![OptioLabs OptioInsight](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194202/optio-insight-400x200.jpg)
Correlate real-time data from mobile devices across the enterprise
OptioLabs announced the availability of OptioInsight for enterprises using OptioCore-secured devices. OptioInsight correlates real-time data from mobile devices across the …
![Android](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194536/android-400x200.jpg)
Mobile banking Trojan bypasses Google Play security
The Acecard malware is capable of attacking users of nearly 50 different online financial applications and services and is able to bypass Google Play store security measures, …
![world in hand](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194240/world-hand-400x200.jpg)
Perceptions and buying practices of infosec decision makers
CyberEdge Group surveyed 1,000 IT infosec decision makers and practitioners from 10 countries, five continents, and 19 industries, and unsurprisingly, the news is not good. In …
![mobile devices](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194354/mobile_devices-400x200.jpg)
Review: Mobile Data Loss
Employees increasingly use mobile devices for work and to access their company’s resources. That should be, by now, an accepted reality for all those who work in the IT …
![NowSecure](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194434/nowsecure-report-400x200.jpg)
A look into the current state of mobile security
A quarter of all mobile apps have at least one high risk security flaw, 35 percent of communications sent by mobile devices are unencrypted, and the average mobile device …
![Android](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195534/android-large-400x200.png)
Rooting malware lurking in third party Android app stores
Downloading Android apps from Google Play might not always be a safe proposition, but downloading them from third party app stores is definitely less safer. According to Trend …
![Library](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195203/library-400x200.jpg)
Success of the Internet of Things depends on privacy and security
Even as the Internet of Things (IoT) creates new usages, systems and ways to manage and store data, there is a parallel need for impermeable privacy policies and protection …
![Frame](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195240/frame-400x200.jpg)
Most companies do nothing to protect their mobile apps
There’s a wide disparity between consumer confidence in the level of security incorporated into mobile health and finance apps and the degree to which organizations …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints