Security News
![Mobile Device Management: Best Practices](/static/build/img/news/alt/Data-Cybersecurity-Predictions-small.jpg)
Jeff Gilhool of Lookout Discusses Protecting Patient PrivacyJeff Gilhool of Lookout explains how phishing and malware are becoming bigger issues for mobile devices and describes what healthcare...
![How financial services companies can protect against mobile threats](/static/build/img/news/alt/application-stats-small.jpg)
Financial services organizations face a variety of cyber threats. But mobile risks represent a major Achilles' heel for the industry, says a new report from Wandera.
![Hackers Slurp $500,000 Through 7-Eleven Mobile Payment App](/static/build/img/news/alt/application-stats-small.jpg)
Poor Password Reset Process Proves Too Convenient, as 900 Customers AffectedHackers appear to have accessed a new mobile payment app for 7-Eleven customers in Japan, taking about $500,000 from 900...
![Protect privacy and provide secure mobile access to corporate data](/static/build/img/news/alt/application-stats-small.jpg)
In this Help Net Security podcast, Mike Campin, VP of Engineering at Wandera, talks about how their solution solves a problem that every business is facing today, which is how to fully embrace the...
![Annual spend on Mobile Edge Computing will reach $11.2 billion by 2024](/static/build/img/news/alt/Data-Cybersecurity-Predictions-small.jpg)
Total annual spend on Mobile Edge Computing (the collection and analysis of data at the source of generation, at the Edge of the network, instead of a centralised location such as the cloud), will...
![Will mobile devices replace passwords?](/static/build/img/news/alt/application-stats-small.jpg)
Mobile devices could provide a more secure, user-friendly mode of account authentication, according to an IDG and MobileIron report.
![Mobile apps riddled with high-risk vulnerabilities, warns report](/static/build/img/news/alt/Data-Cybersecurity-Predictions-small.jpg)
Be careful before installing that mobile app on your iOS or Android device - many mobile applications are riddled with vulnerabilities.
![76% of mobile apps have flaws allowing hackers to steal passwords, money, and texts](/static/build/img/news/alt/Data-Cybersecurity-Predictions-small.jpg)
Android apps have more critical vulnerabilities than iOS apps do, according to a Positive Technologies report.
![Push Technology Used in Mobile Attacks](/static/build/img/news/alt/phishing-statistics-cybersecurity-scaled-small.jpg)
Researchers have detected an Android trojan that abuses the web push technology. In its benign use, web push is used by legitimate websites -- such as news sites -- to send out new event...
![Trend Micro and NTT DOCOMO solution protects IoT devices running on DOCOMO’s mobile network](/static/build/img/news/alt/application-stats-small.jpg)
Trend Micro, a global leader in cybersecurity solutions, announced NTT DOCOMO, Japan’s leading mobile operator and one of the world’s foremost contributors to 3G, 4G and 5G mobile network...