CommentaryAndroid Smartphone Sellers Should Patch, Refund Or Perish
FTC should crack down on wireless carriers and smartphone manufacturers that put their customers at risk by failing to update Android devices. Security Tools Show Many Dots, Few Patterns
Today's security software wastes valuable time by delivering data dumps, rather than focusing on trends. But you can create your own visualizations. Apple Suggests iMessage As SMS Bug Work-Around
Rather than fixing a security problem discovered last week, Apple tells users concerned with SMS spoofing to use its iMessage product instead of... What Sophos Brings To MDM Table
Security vendors are rushing to fill gaping holes in IT's ability to manage mobile devices. But if you expect perfection, you'll wait too long. Apple Security Talk Suggests iOS Limits
Apple rightly earned plaudits for delivering a presentation on iOS security at Black Hat. But what was left unsaid may have revealed new details... When Hackers Meet Girlfriends: Readers Judge Our Theory
My modest proposal to deter law-breaking hackers by helping them get girlfriends sparked condemnation, support, and even marriage advice.
By The Numbers
What Keeps Us Awake
We polled 1,084 security pros about their mobile security nightmares:
Note: Three responses allowed
NewsSmartphone Theft: What Is Best Defense?
While mobile network operators are creating a global database to track stolen smartphones, some police say that's not enough. New York's Attorney... VMware Fights Android BYOD Headaches
VMware's BYOD ambitions kick into gear through its partnership with Verizon. But is the virtualization heavyweight making its mobile management... Apple iPhone Decryption Backlog Stymies Police
Apple's waiting list to bypass security controls on latest-generation iPhone and iPad devices means months-long delays for law enforcement...
- BlackBerry, Samsung Get Pentagon Nod Of Approval
- 10 Top Password Managers
- Can You Hack This Smartphone App For £10,000?
- IBM Makes Enterprise Mobile Security Move
- Twitter Trouble: 9 Social Media Security Tips
- AP Twitter Hack: Lessons Learned
- Chinese Hackers Seek Drone Secrets
Mobility's Next Challenge: 8 Steps to a Secure Environment
Taking your company's mobile capabilities to the next level--whether on personally or company-owned devices-requires a lifecycle management plan that encompasses application security, development, distribution, support and enhancement. We show you how to get there and provide insight into five mobile application development options.
Buyer's Guide: Mobile Device Management
Want the lowdown on nine top MDM products? Our InformationWeek Buyer's Guide is your one-stop guide for choosing an MDM system that match your requirements. ZIP file includes: Detailed comparison charts on security, administration, and platform and reporting features; our full questionnaire; and responses from Absolute Software, AirWatch, Fiberlink Communications, JAMF Software, MobileIron, Odyssey Software, Symantec, Tangoe, and Zenprise.
Dark Side of Mobile Apps
Companies are rushing headlong to develop applications for Android, Apple and BlackBerry devices. But IT must maintain its secure development lifecycle process or risk a black eye.
Reducing Mobile Device Risks to Enterprise Data
Innovative IT shops are turning the mobile device management challenge into a business opportunity--and showing that we can help people be more connected and collaborative, regardless of location. We offer a framework of four possible strategies to secure the mobile environment.