Security Section Index

Apple Gets Serious About MDM

The maker of iPhones and iPads touts its new device management options for businesses ahead of a new iOS 7 update.

The Dirty Dozen Smartphones: Why IT Admins Should Care

Security firm Bit9 says a majority of smartphones are running out-of-date and insecure operating systems that present a threat to critical business data. It has created a list of 12 of the most vulnerable smartphones. Guess who dominates the list?

Windows Phone Users Hung by Update Hack

Users of an 'unofficial' updater for Windows Phone 7 have gotten themselves in a jam that may prevent them from ever updating their phones again.

10 Tips to Tighten Smartphone Security

You don’t need an IT staff or complex implementation to enjoy basic, common-sense data protection on your smartphone. Follow these 10 DIY tips for better smartphone security.

RIM Recommends Users Disable JavaScript to Protect BlackBerry OS 6 Handsets

After it was revealed that a mobile security vulnerability exists in the browsers of BlackBerry's running 6.0, RIM issues a security advisory.

Bogus Android Security Patch Discovered by Symantec

The security stalwart reports today that a fake Android security patch contains 'suspicious code.'

Google Uses Kill-Switch to Address Malware at Android Market

The Internet giant moves beyond removal of infected Android apps to fix malware outbreak at the Android Market.

Malware Discovered in Android Market

Google moves quickly to remove the offending mobile apps. What should users concerned about smartphone security watch out for?

Kaspersky Lab Extends Mobile Security to Android, BlackBerry Operating Systems

Internet security firm expands scope of service to include smartphones running the Android and BlackBerry mobile OSes.

Safeguard Mobile Devices with Symantec Endpoint Protection Mobile Edition

Our review highlights key features of Symantec's new mobile security offering that allows mobile IT to configure and deploy security measures from a centralized administrator’s console.

Mobile Users More Susceptible to Phishing Scams

Mobile users are three-fold more likely to divulge their login and password information to phishers, according to security software vendor Trusteer.

Mobile Security Review: AirWatch MDM for iOS 4

With the new version of AirWatch powered by Apple MDM, mobile management can control iOS 4 iPads, iPhones, and the apps allowed to run on them.

Top Five Enterprise Security Trends for 2011

Mobile devices in the workplace rank high as potential risks in the list of emerging security trends for the coming year.

How To Avoid the Top 10 Smartphone Security Mishaps of the Holiday Season

To help with mobile device management during the holiday shopping season, we outline the top 10 smartphone security mistakes to safeguard against.

Hackers Set Sights on Android Mobile Devices

Fresh study from AdaptiveMobile finds that mobile malware infections surged 33 percent this year and that Android-based devices are becoming particularly attractive to authors.

Mobile Security Survey Says Smartphone Users Get Sloppy During Holidays

Symantec report finds that most enterprise employees become much more casual about the data they share and access via smartphones over the holidays.

Google Enhances Android Mobile Device Security

Android 2.2 devices gain new administrative controls giving mobile management more browser-based security options.

New Mobile Management and Mobile Security Solutions from Symantec

The security giant enters the mobile enterprise with new solutions for mobile device management and mobile security.

How to Fight Four Cloaked Wi-Fi Security Threats

We put four lesser-known wireless network security menaces in the spotlight by providing mobile IT guidance on how to combat them.

Cisco Brings 'Highly Secure' Net Connectivity to the iPhone

The networking giant's AnyConnect Secure Mobility Solution is now available at the iPhone App Store.

Mobile Security: 20 Great Android Apps

We highlight 20 Android security apps that will help mobile IT protect data and devices.

Top Six Mobile Security Threats and How to Prevent Them

We offer tips for addressing smartphone security and wireless network security issues resulting from the influx of handsets in the enterprise.

Mobile Security Tutorial: Enterprise Wi-Fi Encryption in Mac OS X

Need to configure and connect to WPA networks in recent versions of Leopard and Snow Leopard? Our wireless security tutorial outlines the steps mobile IT staff need to follow to use enterprise Wi-Fi encryption and 802.1X in Mac OS X.

Android Smartphones Hit By SMS-Sending Trojan

The first SMS Trojan targeting mobile devices running the mobile Linux Android operating system is discovered by Kaspersky Lab researchers.

Smartphones to Get Biometric Identity Platform for Mobile Security

New solution from BIO-Key lets enterprises use fingerprint biometric data to identify and authenticate smartphone, laptop, tablet and desktop users.

RIM Preps Mobile Security App BlackBerry Protect

Research In Motion is testing a free, cloud-based mobile security service for consumers that offers remote backup, lock and wipe functionality for BlackBerrys.

Google Tightens Mobile Security

Mobile IT and Google Apps administrators now have new mobile device management options for iPhone, Nokia and Windows Mobile devices. But what about Android devices?

Fact or Fiction? Evaluating Common Wi-Fi Security Threats

Mobile security managers should be sure to know what's cause for concern -- and what isn't -- when it comes to Wi-Fi security issues.

Mobile Security Measures for Sending Protected E-Mails

We outline the steps needed to securely send e-mails and transfer files.

Mobile Security Review: Kanguru's Affordable Thumb Drive Protection Offering

Mobile security covers more than smartphones and laptops. We evaluate the Kanguru Remote Management Console Cloud Edition, an affordable way to protect data on thumb drives.

Feds Begin Investigation of Mobile Security Issues with iPad Breach

The FBI and FCC are studying the details of the recent iPad security breach.

Smartphone Security Beyond Lock and Wipe

We outline the three mobile security approaches mobile management can take to ensure that company data is protected.

Mobile Security Tips for Encrypting USB Flash Drives

Flash drives are super convenient for transferring data, but to ensure they don't create a mobile security crisis, we outline steps for encrypting USB drives.

Wireless Network Security Review: CACE Pilot

In this comprehensive review, CACE Pilot, which cuts large-volume traffic captures into smaller data sets for easier evaluation, is tested on wireless networks and LANs.

Verizon Taps Cloud to Tighten Mobile Security, Streamline Mobile Management

Verizon Business rolled out a new cloud-based service that will make it much easier for mobile office workers to securely access their corporate networks.

10 Free Wireless Network Security Test Tools for WLANs

We highlight some of the best, free tools mobile management can use to evaluate Wi-Fi network security issues.

Mobile Security: Seven Steps for Supervising Personal Smartphones in the Enterprise

Our mobile IT manager’s guide to deploying and supervising personal smarpthones in the enterprise covers mobile security, the use of mobile apps and policy creation.

Mobile Security Watch: Smartphone Vulnerabilities

Mobile IT managers may know smartphone security is critical, but may not understand the reasons why. We outline smartphone vulnerabilities you should be aware of before crafting mobile security policy.

Remote Control for BlackBerrys, Enterprise Mobile Management Support for iPad

Mobile management software firm Zenprise today rolls out remote control for BlackBerry troubleshooting and mobile security. Plus, enterprise management support for the iPad.

AT&T WorkBench Brings Mobile Security to iPhone

A mobile app for iPhone strengthens security to make the mobile device IT friendly. Also, AT&T rolls out two new mobile Web applications for Oracle CRM On Demand.

Free Security Applications for Mobile Management

Highlights of seven advanced, free security applications covering VPNs, encrypting flash drives and locking down public workstations.

Mobile Security Using BitLocker on Laptops

BitLocker's comprehensive hard drive encryption means surefire laptop security.

Regulatory Compliance Top Concern in Telehealth

Recognizing telemedicine trend, Fiberlink's cloud-based telehealth solution offers streamlined mobile management and mobile security HIPAA compliance.

Mobile Security for the iPhone with Trust Digital

Recognizing the exploding demand for mobile applications and the need for mobile security, Trust Digital developed a solution for mobile IT to deploy iPhones -- and manage them -- from one centralized location.

Targeting Wireless Network Security Via Wi-Fi Threats

Rogue access points, data interception, DoS downtime -- these are all Wi-Fi threats that can spell trouble for mobile security managers. We outline our Top 10 Wi-Fi threats and offer guidance on how to protect against them.

Wireless Network Security with Mobile Device Data Protection

Securing mobile data isn't just about securing devices: It's also about ensuring the security of network transport infrastructure. Juniper's latest offering improves mobile networking security and includes support from Verizon and Sprint.

Smartphone Security at Risk on iPhone, Android Handsets

When it comes to mobile applications and smartphone security, is Apple's closed iPhone OS strategy better than Google's open Android approach?

Mobile Security: A Surefire Laptop Encryption Strategy

Deploying hardware-based, self-encrypting drives for laptops can reduce mobile security risks.

Google's Online Collaboration Play with Enterprise Apps

Google adds smartphone security features to mobile enterprise apps to make them more mobile IT-friendly. Is this a push to take on RIM in the workplace?

Five Tips for Securing Smartphones in the Enterprise

Five quick steps IT mobile managers can take to keep smartphones secure as more employees bring their own handsets into the office.

Mobile Cloud Computing: How to Secure Data

As the use of mobile devices in the enterprise soars, so does the deployment of mobile cloud applications. We offer a guideline for keeping mobile cloud data safe.

CES 2010: Mobile Device Security Tips

Mobile Internet devices took center stage at the Consumer Electronics Show this year, which means new security risks for enterprise IT. We offer 10 tips for countering against wireless vulnerabilities.

Hackers Turn Their Attention to Smartphones, Apps

A new hoax circulating through the BlackBerry Messenger 5.0 service is a just the tip of the iceberg according to security software vendor McAfee.

Dynamic Duo: Two Vendor-neutral WLAN Management Services

If you are researching WLAN management applications that are vendor agnostic, consider AirWave from Aruba Networks and WiFi Manager from ManageEngine. We highlight some features from these two services.

Securing GSM in Wake of Exposed Vulnerability

The GSM code was vulnerable even before the recent hack by Karsten Nohl made headlines across the world. We highlight services you can use to keep calls secure while the issue is being evaluated by the GSM Association.

Hacker Exposes Cell Phone Encryption

German researcher presents findings purporting to demonstrate weakness of GSM standard.

WIPS for Deploying New Wi-Fi Standard

AirTight, a firm specializing in Wireless Intrusion Prevention Systems, can help you protect your network if you're prepping for a Wi-Fi upgrade.

Symantec Launches Mobile Management Suite

Symantec recently rolled out a trio of new offerings for protecting mobile devices and data in the enterprise.

Keeping Pace with the Changing Face of Mobile Management

Management, security, compliance, the use of employee-owned consumer handsets -- these are interesting times in the enterprise mobile device space, and there's no doubt that many more challenging issues will emerge. Over the coming months, Paul Rubens will be taking a close look at the most important ones facing IT.

4G: Here It Comes, Ready or Not -- Part III

Sprint's decision to go with WiMAX makes it the odd man out. Most North American carriers here will wait for LTE (Long Term Evolution), a "true" 4G standard that won't be here for at least two years. Either way -- be it WiMAX now or LTE later on -- inexpensive, ubiquitous, high-speed connectivity should be on enterprises planning horizon. IT pros need to start thinking about the implications now and possibly even act on them.

Smartphone Security Basics for Information Officers

What should businesses do to protect their proprietary and sensitive information? In a nutshell, writes security expert Laura Taylor, there are three safeguards that IT needs to put into place at their organizations regarding smartphone security: controls, policies and training.

Tutorial: BlackBerry - FISMA Compliance for Government Agencies

All U.S. federal agencies are required to comply with the Federal Information Security Management Act (FISMA) of 2002. The PDA/smartphone of choice for the U.S. government is the BlackBerry. Therefore, understanding BlackBerry security controls, threats and vulnerabilities is essential.

VPN Options for Mobile Devices

A virtual private network, establishes a secure, encrypted link between your smartphone and an end point, such as your organization's corporate network. We outline how to leverage VPN features to secure your mobile workforce.

Beyond Basics: Enterprise Wi-Fi Lockdown

Most mobile managers know the basics of securing a corporate Wi-Fi network, but for the enterprise you need to take extra steps for security. We show you how.

Security: Fifteen Quick Fixes for Your Network

We outline 15 ways to shore up your network by using the 20 baseline security controls outlined in the Consensus Audit Guidelines.

Study: Enterprise in the Dark on Mobile Data

Many mobile managers are unaware of what corporate information is residing on employees' smartphones.

Firm Sees iPhone as Enterprise Security Token

Forget smart cards: Charismathics says its iEnigma gives companies a way to enable two-factor authentication on their iPhone.

Tip: Windows Mobile — How to Use Your XV6800/Mogul on a Wi-Fi Network

Wi-Fi is particularly handy when you're deep inside a concrete building or when you're in a remote place where cell towers are sparse.

Tip: iPhone — Bluetooth Goes South with Software 2.1

iPhone user resolves problem pairing first-gen model with Bluetooth peripherals after firmware upgrade.

Tip: Changing BlackBerry SIM Cards

How you remove a subscriber identity module (SIM) card and swap it between compatible mobile phones varies from device to device, even among BlackBerry wireless handhelds and smartphones.

Tip: Smartphone - Better Wireless Security Through Verizon Wireless

Carrier announces enhanced security options for enterprise and government customers.

Tip: Moto Q — How to Prevent Unintended Calls

While some phones have a keypad lock on the home screen or start menu, on the Motorola Q you have two different ways to prevent your phone from placing unwanted "pocket calls."

Tip: Samsung Epix — Opening Data Doors With Wi-Fi

How to manage Wi-Fi connections with Samsung's heir to the BlackJack and BlackJack II.

Tip: Samsung Epix — Vibrate Shut-off & Lock/Unlock

Out of the box, the Windows Mobile-run Samsung Epix is set to vibrate whenever you tap the screen, which can be kind of annoying.

Tip: Smartphone — Proactively Protect Mobile Data

A few options to help protect your smartphone (and the data on it) from malware and prying eyes.

123

Displaying recent articles. Read More in Security »

Site Resources