Commentary
Apple Suggests iMessage As SMS Bug Work-AroundRather than fixing a security problem discovered last week, Apple tells users concerned with SMS spoofing to use its iMessage product instead of... What Sophos Brings To MDM Table
Security vendors are rushing to fill gaping holes in IT's ability to manage mobile devices. But if you expect perfection, you'll wait too long. Apple Security Talk Suggests iOS Limits
Apple rightly earned plaudits for delivering a presentation on iOS security at Black Hat. But what was left unsaid may have revealed new details... When Hackers Meet Girlfriends: Readers Judge Our Theory
My modest proposal to deter law-breaking hackers by helping them get girlfriends sparked condemnation, support, and even marriage advice. One Secret That Stops Hackers: Girlfriends
The majority of hackers "age out" of hacking as they get older and find girlfriends, families, and other responsibilities. Why not invest in... Most Smartphones Lost At Night
LookOut Mobile says two-thirds of lost devices vanish from pubs and bars at night.
By The Numbers
What Keeps Us Awake
We polled 1,084 security pros about their mobile security nightmares:

Note: Three responses allowed
News
7 Enterprise Mobility Predictions For 2013Smartphones and tablets fueled the rise of BYOD in 2012, but better management of those devices is top of mind in 2013. CTIA To Merge U.S. Trade Shows In 2014
U.S. mobile and wireless industry's main lobbying group will combine its two yearly shows into one larger event in a bid to remain relevant. 10 Biggest Information Security Stories Of 2012
From John McAfee's escape from Belize to the privacy debacle that compromised CIA director Petraeus' career, 2012 had no shortage of security...
More Stories:
- 7 Top Information Security Trends For 2013
- 12 Gifts For The End Of The World
- Attack Turns Android Devices Into Spam-Spewing Botnets
- London Firefighters Pursue Twitter Monitoring
- Ransomware, Social Scams Lead 2013 SMB Security Fears
- Google's Android Malware Detection Falls Short
- Citrix Buys Zenprise: What's Next In BYOD?
InformationWeek Reports
Mobility's Next Challenge: 8 Steps to a Secure Environment
Taking your company's mobile capabilities to the next level--whether on personally or company-owned devices-requires a lifecycle management plan that encompasses application security, development, distribution, support and enhancement. We show you how to get there and provide insight into five mobile application development options.
Buyer's Guide: Mobile Device Management
Want the lowdown on nine top MDM products? Our InformationWeek Buyer's Guide is your one-stop guide for choosing an MDM system that match your requirements. ZIP file includes: Detailed comparison charts on security, administration, and platform and reporting features; our full questionnaire; and responses from Absolute Software, AirWatch, Fiberlink Communications, JAMF Software, MobileIron, Odyssey Software, Symantec, Tangoe, and Zenprise.
Dark Side of Mobile Apps
Companies are rushing headlong to develop applications for Android, Apple and BlackBerry devices. But IT must maintain its secure development lifecycle process or risk a black eye.
Reducing Mobile Device Risks to Enterprise Data
Innovative IT shops are turning the mobile device management challenge into a business opportunity--and showing that we can help people be more connected and collaborative, regardless of location. We offer a framework of four possible strategies to secure the mobile environment.