Security firm Bit9 says a majority of smartphones are running out-of-date and insecure operating systems that present a threat to critical business data. It has created a list of 12 of the most vulnerable smartphones. Guess who dominates the list?
Security Section Index
Users of an 'unofficial' updater for Windows Phone 7 have gotten themselves in a jam that may prevent them from ever updating their phones again.
You dont need an IT staff or complex implementation to enjoy basic, common-sense data protection on your smartphone. Follow these 10 DIY tips for better smartphone security.
After it was revealed that a mobile security vulnerability exists in the browsers of BlackBerry's running 6.0, RIM issues a security advisory.
The security stalwart reports today that a fake Android security patch contains 'suspicious code.'
The Internet giant moves beyond removal of infected Android apps to fix malware outbreak at the Android Market.
Google moves quickly to remove the offending mobile apps. What should users concerned about smartphone security watch out for?
Internet security firm expands scope of service to include smartphones running the Android and BlackBerry mobile OSes.
Our review highlights key features of Symantec's new mobile security offering that allows mobile IT to configure and deploy security measures from a centralized administrators console.
Mobile users are three-fold more likely to divulge their login and password information to phishers, according to security software vendor Trusteer.
With the new version of AirWatch powered by Apple MDM, mobile management can control iOS 4 iPads, iPhones, and the apps allowed to run on them.
Mobile devices in the workplace rank high as potential risks in the list of emerging security trends for the coming year.
To help with mobile device management during the holiday shopping season, we outline the top 10 smartphone security mistakes to safeguard against.
Fresh study from AdaptiveMobile finds that mobile malware infections surged 33 percent this year and that Android-based devices are becoming particularly attractive to authors.
Symantec report finds that most enterprise employees become much more casual about the data they share and access via smartphones over the holidays.
Android 2.2 devices gain new administrative controls giving mobile management more browser-based security options.
The security giant enters the mobile enterprise with new solutions for mobile device management and mobile security.
We put four lesser-known wireless network security menaces in the spotlight by providing mobile IT guidance on how to combat them.
The networking giant's AnyConnect Secure Mobility Solution is now available at the iPhone App Store.
We highlight 20 Android security apps that will help mobile IT protect data and devices.
We offer tips for addressing smartphone security and wireless network security issues resulting from the influx of handsets in the enterprise.
Need to configure and connect to WPA networks in recent versions of Leopard and Snow Leopard? Our wireless security tutorial outlines the steps mobile IT staff need to follow to use enterprise Wi-Fi encryption and 802.1X in Mac OS X.
The first SMS Trojan targeting mobile devices running the mobile Linux Android operating system is discovered by Kaspersky Lab researchers.
New solution from BIO-Key lets enterprises use fingerprint biometric data to identify and authenticate smartphone, laptop, tablet and desktop users.
Research In Motion is testing a free, cloud-based mobile security service for consumers that offers remote backup, lock and wipe functionality for BlackBerrys.
Mobile IT and Google Apps administrators now have new mobile device management options for iPhone, Nokia and Windows Mobile devices. But what about Android devices?
Mobile security managers should be sure to know what's cause for concern -- and what isn't -- when it comes to Wi-Fi security issues.
We outline the steps needed to securely send e-mails and transfer files.
Mobile security covers more than smartphones and laptops. We evaluate the Kanguru Remote Management Console Cloud Edition, an affordable way to protect data on thumb drives.
The FBI and FCC are studying the details of the recent iPad security breach.
We outline the three mobile security approaches mobile management can take to ensure that company data is protected.
Flash drives are super convenient for transferring data, but to ensure they don't create a mobile security crisis, we outline steps for encrypting USB drives.
In this comprehensive review, CACE Pilot, which cuts large-volume traffic captures into smaller data sets for easier evaluation, is tested on wireless networks and LANs.
Verizon Business rolled out a new cloud-based service that will make it much easier for mobile office workers to securely access their corporate networks.
We highlight some of the best, free tools mobile management can use to evaluate Wi-Fi network security issues.
Our mobile IT managers guide to deploying and supervising personal smarpthones in the enterprise covers mobile security, the use of mobile apps and policy creation.
Mobile IT managers may know smartphone security is critical, but may not understand the reasons why. We outline smartphone vulnerabilities you should be aware of before crafting mobile security policy.
Mobile management software firm Zenprise today rolls out remote control for BlackBerry troubleshooting and mobile security. Plus, enterprise management support for the iPad.
A mobile app for iPhone strengthens security to make the mobile device IT friendly. Also, AT&T rolls out two new mobile Web applications for Oracle CRM On Demand.
Highlights of seven advanced, free security applications covering VPNs, encrypting flash drives and locking down public workstations.
BitLocker's comprehensive hard drive encryption means surefire laptop security.
Recognizing telemedicine trend, Fiberlink's cloud-based telehealth solution offers streamlined mobile management and mobile security HIPAA compliance.
Recognizing the exploding demand for mobile applications and the need for mobile security, Trust Digital developed a solution for mobile IT to deploy iPhones -- and manage them -- from one centralized location.
Rogue access points, data interception, DoS downtime -- these are all Wi-Fi threats that can spell trouble for mobile security managers. We outline our Top 10 Wi-Fi threats and offer guidance on how to protect against them.
Securing mobile data isn't just about securing devices: It's also about ensuring the security of network transport infrastructure. Juniper's latest offering improves mobile networking security and includes support from Verizon and Sprint.
When it comes to mobile applications and smartphone security, is Apple's closed iPhone OS strategy better than Google's open Android approach?
Deploying hardware-based, self-encrypting drives for laptops can reduce mobile security risks.
Google adds smartphone security features to mobile enterprise apps to make them more mobile IT-friendly. Is this a push to take on RIM in the workplace?
Five quick steps IT mobile managers can take to keep smartphones secure as more employees bring their own handsets into the office.
As the use of mobile devices in the enterprise soars, so does the deployment of mobile cloud applications. We offer a guideline for keeping mobile cloud data safe.
Mobile Internet devices took center stage at the Consumer Electronics Show this year, which means new security risks for enterprise IT. We offer 10 tips for countering against wireless vulnerabilities.
A new hoax circulating through the BlackBerry Messenger 5.0 service is a just the tip of the iceberg according to security software vendor McAfee.
If you are researching WLAN management applications that are vendor agnostic, consider AirWave from Aruba Networks and WiFi Manager from ManageEngine. We highlight some features from these two services.
The GSM code was vulnerable even before the recent hack by Karsten Nohl made headlines across the world. We highlight services you can use to keep calls secure while the issue is being evaluated by the GSM Association.
German researcher presents findings purporting to demonstrate weakness of GSM standard.
AirTight, a firm specializing in Wireless Intrusion Prevention Systems, can help you protect your network if you're prepping for a Wi-Fi upgrade.
Symantec recently rolled out a trio of new offerings for protecting mobile devices and data in the enterprise.
Management, security, compliance, the use of employee-owned consumer handsets -- these are interesting times in the enterprise mobile device space, and there's no doubt that many more challenging issues will emerge. Over the coming months, Paul Rubens will be taking a close look at the most important ones facing IT.
Sprint's decision to go with WiMAX makes it the odd man out. Most North American carriers here will wait for LTE (Long Term Evolution), a "true" 4G standard that won't be here for at least two years. Either way -- be it WiMAX now or LTE later on -- inexpensive, ubiquitous, high-speed connectivity should be on enterprises planning horizon. IT pros need to start thinking about the implications now and possibly even act on them.
What should businesses do to protect their proprietary and sensitive information? In a nutshell, writes security expert Laura Taylor, there are three safeguards that IT needs to put into place at their organizations regarding smartphone security: controls, policies and training.
All U.S. federal agencies are required to comply with the Federal Information Security Management Act (FISMA) of 2002. The PDA/smartphone of choice for the U.S. government is the BlackBerry. Therefore, understanding BlackBerry security controls, threats and vulnerabilities is essential.
A virtual private network, establishes a secure, encrypted link between your smartphone and an end point, such as your organization's corporate network. We outline how to leverage VPN features to secure your mobile workforce.
Most mobile managers know the basics of securing a corporate Wi-Fi network, but for the enterprise you need to take extra steps for security. We show you how.
We outline 15 ways to shore up your network by using the 20 baseline security controls outlined in the Consensus Audit Guidelines.
Many mobile managers are unaware of what corporate information is residing on employees' smartphones.
Forget smart cards: Charismathics says its iEnigma gives companies a way to enable two-factor authentication on their iPhone.
Wi-Fi is particularly handy when you're deep inside a concrete building or when you're in a remote place where cell towers are sparse.
iPhone user resolves problem pairing first-gen model with Bluetooth peripherals after firmware upgrade.
How you remove a subscriber identity module (SIM) card and swap it between compatible mobile phones varies from device to device, even among BlackBerry wireless handhelds and smartphones.
Carrier announces enhanced security options for enterprise and government customers.
While some phones have a keypad lock on the home screen or start menu, on the Motorola Q you have two different ways to prevent your phone from placing unwanted "pocket calls."
How to manage Wi-Fi connections with Samsung's heir to the BlackJack and BlackJack II.
Out of the box, the Windows Mobile-run Samsung Epix is set to vibrate whenever you tap the screen, which can be kind of annoying.
A few options to help protect your smartphone (and the data on it) from malware and prying eyes.
Specify that you want your BlackBerry to lockso you don't make any unintended calls, for instancewhen you slip the smartphone into its sleeve.
Displaying recent articles. Read More in Security »
In addition to refreshing workstations and servers, IT pros must now also plan lifecycle refreshes for laptops, tablets, smartphones and other mobile devices. From increased productivity to compliance to support costs, discover what factors are driving those decisions. Also, download this report and learn which mobile initiatives IT organizations are investing in most aggressively.