All NewsACLU Seeks Carrier Smackdown Over Android Updates
ACLU urges FTC to let consumers return carrier-supplied Android devices for full refund or exchange within two years if they don't get regular... HP Brings Mobile Cloud Services To Enterprise
HP's cloud services will add a set of mobile device services that includes file sharing capabilities to challenge Dropbox. Airplane Takeover Demonstrated Via Android App
Software hack allows security researcher to take control of aircraft navigation and other systems; avionics manufacturers emphasize that the... Malware Developers Hijack Chromium Framework
Google Chromium project responds by switching to another download site and promising to put new techniques in place to block automated downloads. Android Malware Infects Activists' Phones
Targeted, data-stealing attack launched via Tibetan activist's email account leads to Chinese server in Los Angeles, says Kaspersky Lab. Beware Smartphone Lurkers: Cloud Storage File Remnants
Security investigators recovered Box, Dropbox and SugarSync files and unique file IDs, via forensic dump of iPhone and Android smartphone memory. iPhone, iPad Configuration Files Security Hole Shown
Mobile configuration files used by carriers could be repurposed to steal data and remotely control an iPhone or iPad, security firm warns. BYOD Threats Concern British Privacy Regulator
Information Commissioner points to risks from employee-owned devices, releases guide to help businesses avoid data breaches, fines. Pwn2Own Prizes Exceed $500K For Exploits
Only Google Chrome OS withstands attack in annual hacking contest as Flash, Java and every major browser are exploited. Cell Phone Spam Doesn't Pay, FTC Says
FTC has filed 8 civil lawsuits against cell phone spammers, accusing them of promoting award scams. Malware Writers Prefer Android
A whopping 96% of all smartphone malware was written for Android in Q4 2012, reports F-Secure. What Unlocked Phones Mean For Businesses
U.S. lawmakers pledge to change regulations that make it illegal to unlock cell phones. Is there an upside for the enterprise? SMS Spam Delivers More Malware, Scams
Threats are now often disguised as gift offers, product giveaways, and payment protection insurance. Pentagon Unveils Secure Mobile Device Plan
Military releases a new plan to accelerate the adoption of mobile devices and apps for both classified and unclassified use. 2 More Java Zero-Day Vulnerabilities Emerge
While Oracle investigates reports that two bugs in Java 7 could allow attackers to remotely bypass the sandbox and compromise a system, security... Apple, Facebook Twitter Attacks: 6 Key Facts
FBI investigates how hackers compromised an iOS developer website to exploit Java plug-in vulnerabilities and breach major social networking and... Xerox Targets Cloud Document Security Worries
Xerox, working with Cisco and McAfee, launches printers and apps designed to securely route documents to Dropbox, Google Apps and other cloud... Want Stronger Passwords? Try Bad Grammar
Beware passwords built using too many pronouns or verbs, Carnegie Mellon security researchers say. String together nouns instead. RIM Launches BlackBerry Enterprise Service 10
RIM's new mobility management platform will help companies manage BlackBerry 10 devices, as well as those powered by iOS and Android, in an effort... OKCupid Blind Date App: Beware Privacy Flub
OKCupid.com smartphone app promised safe blind date arrangement, but API failed to hide sensitive information about users. Apple Targets App Store Bait And Switch Scammers
Apple will lock down app screenshots after approval to stem a spate of sellers hawking fake apps. 7 Enterprise Mobility Predictions For 2013
Smartphones and tablets fueled the rise of BYOD in 2012, but better management of those devices is top of mind in 2013. CTIA To Merge U.S. Trade Shows In 2014
U.S. mobile and wireless industry's main lobbying group will combine its two yearly shows into one larger event in a bid to remain relevant. 10 Biggest Information Security Stories Of 2012
From John McAfee's escape from Belize to the privacy debacle that compromised CIA director Petraeus' career, 2012 had no shortage of security... 7 Top Information Security Trends For 2013
From sandboxing enterprise apps on mobile devices to hacking websites via high-bandwidth cloud attacks, experts detail the security trends they...
Mobility's Next Challenge: 8 Steps to a Secure Environment
Taking your company's mobile capabilities to the next level--whether on personally or company-owned devices-requires a lifecycle management plan that encompasses application security, development, distribution, support and enhancement. We show you how to get there and provide insight into five mobile application development options.
Buyer's Guide: Mobile Device Management
Want the lowdown on nine top MDM products? Our InformationWeek Buyer's Guide is your one-stop guide for choosing an MDM system that match your requirements. ZIP file includes: Detailed comparison charts on security, administration, and platform and reporting features; our full questionnaire; and responses from Absolute Software, AirWatch, Fiberlink Communications, JAMF Software, MobileIron, Odyssey Software, Symantec, Tangoe, and Zenprise.
Dark Side of Mobile Apps
Companies are rushing headlong to develop applications for Android, Apple and BlackBerry devices. But IT must maintain its secure development lifecycle process or risk a black eye.
Reducing Mobile Device Risks to Enterprise Data
Innovative IT shops are turning the mobile device management challenge into a business opportunity--and showing that we can help people be more connected and collaborative, regardless of location. We offer a framework of four possible strategies to secure the mobile environment.