smartphones
BYOD is just the tip of the iceberg
The growth in cloud storage devices means that corporate IT departments are now at the mercy of consumer-based applications, as more and more employees look to take their work …
The arrival of the post-PC threat era
With the release of its 2012 Annual Roundup and Mobile Security reports, Trend Micro documents how cybercriminals have moved beyond the PC, targeting Android, social media and …
Many Fed smartphones have zero password protection
A new report showcases increased security risks with mobile device usage within Federal government as adoption of smartphones and other mobile devices becomes more widespread. …
Ubuntu comes to the phone
Canonical announced a smartphone interface for its operating system, Ubuntu, using all four edges of the screen for a more immersive experience. Ubuntu gives handset OEMs and …
Samsung Galaxy S3 found storing passwords in plain text
Samsung Galaxy S3, currently one of the most popular smartphones on the market, stores passwords in plain text. The culprit is actually Samsung’s S-Memo app, and all the …
Samsung fixes Galaxy S3 bug, researchers offer fix for other phones
Given the amount of information we all keep on our smartphones, it’s no wonder that the recently demonstrated Samsung Galaxy S3 remote data-wipe hack has ruffled quite a …
Researcher shows Samsung Galaxy S3 remote data-wipe hack
At the recently held ekoparty Security conference in Buenos Aires security researcher Ravi Borgaonkar has demonstrated a simple attack that could lead to a remote wiping of …
Researchers bypass NFC access control with smartphone
A security flaw in most Mifare NFC contactless cards can easily be misused by hackers to modify the contents of the cards and get free rides on at least two U.S. transit …
Copyright infringement blackmail scam targets mobile phone users
Swedish mobile users are being targeted with SMS messages accusing them for copyright infringement and urging them to pay a fine between 90 and 195 euros. “You have …
BYOD reality: Missing mobile device usage policies
Gone are the days when employees only used a company-issued phone or laptop for work. Today, employees bring personal smartphones and tablets to the office and often have …
Broadcom introduces 5G WiFi combo chip for smartphones
Broadcom introduced the BCM4335, the first complete 5G WiFi combo chip for smartphones, tablets, ultrabooks and other mobile devices. 5G WiFi, the 5th generation of Wi-Fi …
Blue Coat delivers mobile application controls
Blue Coat introduced mobile application controls that close the security gap created by unsanctioned mobile applications on the corporate network. The growth in bring your own …
Featured news
Resources
Don't miss
- Hackers exploit old FortiGate vulnerabilities, use symlink trick to retain limited access to patched devices
- Why security culture is crypto’s strongest asset
- Why remote work is a security minefield (and what you can do about it)
- Trump orders revocation of security clearances for Chris Krebs, SentinelOne
- FortiSwitch vulnerability may give attackers control over vulnerable devices (CVE-2024-48887)