加载中...

Security Experts:

Mobile & Wireless
long dotted

NEWS & INDUSTRY UPDATES

On Saturday, Google addressed two separate security issues within Google Wallet, one which takes some skill and knowledge to exploit, and one that anyone searching the lost and found box can exploit - assuming they are aware of it.
A group known as SwaggSec has successfully hacked computers at Foxconn, a multi-national electronics manufacturer, and posted the stolen data to The Pirate Bay website
Visa announced that U.S. banks have issued an estimated one million Visa-branded, EMV chip-enabled cards as the end of 2011. The milestone shows progress the industry is making toward implementing the more secure card technology, but the U.S. is far behind Europe in terms of adoption.
Google Highlights Security Processes for Android, Adds New Layer of Security
All BlackBerry smartphones running BlackBerry 7 and BlackBerry 7.1 benefit from the FIPS 140-2 certification recognized by the U.S. and Canadian governments.
IBM announced a new endpoint management suite aimed at mobile devices, in addition to hinting at further R&D in the segment thanks to a recent acquisition.
Register for this webcast and see how real customers achieved an ROI up to 152% by deploying Symantec Protection Suite and get a framework to evaluate your potential financial benefits.
McAfee has announced Mobile Security 2.0, confirming the software’s presence in the Android Market last week, which appeared out of the blue to some users.
A threat called Android.Counterclank by Symantec, is said to have infected 1-5 million users, via 13 different applications. As word of the Android malware started to spread, Symantec’s rival in the mobile protection space – Lookout Mobile Security – disputed their claims as hype.
Tablets were the hot topic for much of 2011, Good Technology says, but the mid-October launch of the iPhone 4S sparked smartphone activations across Good’s customer base to spike.

FEATURES, INSIGHTS // Mobile & Wireless

rss icon

Johnnie Konstantas's picture
IT managers aren’t the only ones aware of this BYOD trend – attackers are too. Whether their aim is to promote a cause (hacktivism) or turn a profit, our mobile devices constitute perhaps the easiest way to do so.
Robert Vamosi's picture
Next year you'll be able to do all your holiday shopping without ever opening a physical wallet—or so Google hopes. The previously announced Google Wallet is comfortably into beta. Google is betting that by 2014 half of all smart phones will ship with compatible NFC chips installed.
Chris Hinkley's picture
Mobile applications and the platforms they are built on make PA-DSS compliance difficult due to the rapidly evolving threat landscape. With increased attacks and their tragic affects on businesses and consumers, it's important to make make sure your mobile operations properly secured.
Oliver Rochford's picture
Mobile devices share basic components as a PC, but that is truly where the similarities end. The differences are far more important than the shared points, and will scupper most traditional security approaches, which all hinge on one really simple idea.
Johnnie Konstantas's picture
4G/LTE networks are based on entirely new infrastructure. Naturally, 4G/LTE all IP infrastructure will extend the attack surface. While technologies like firewalls, intrusion detection sensors, encryption tools and subscriber protection suites can ameliorate some of the risks, the question now is: What’s available to you from your provider and for your chosen device?
Andrew Jaquith's picture
Is Research In Motion in trouble? Financially, RIM continues to be a healthy company. But if doesn't “think different” about its network strategy, its customers may think different about their choice of handset vendor.
Andrew Jaquith's picture
Last spring I predicted that if sales of the BlackBerry PlayBook were less than 1/4 of the number of iPads sold, we'd know what the next five years of enterprise security would look like. How did RIM do? Not so well, as it turns out.
Robert Vamosi's picture
With more and more mobile malware being directed at Android-based phones, you’d think the carriers and manufacturers would respond quickly to security and software updates to the underlying operating systems. According to a new survey that doesn't appear to be the case.
Johnnie Konstantas's picture
Enterprises use smartphones and mobile devices in some manner to improve mobility and productivity, as do government agencies and even small-to-medium sized businesses. These organizations must protect their network and their users – and their devices, whether corporate owned or a user’s personal mobile device – from loss, theft and exploit.
Robert Vamosi's picture
Laptop batteries use microcontrollers to tell the lithium battery when it's full and when it needs to be recharged. What's intriguing is that cybercriminals could install malware that would remain on the device no matter how many times you reinstalled the operating system.