Wireless / Mobile Security — News

Mobile payments, PCI DSS compliance: Some clarity

Mobile payments technology is a loud sonic boom thundering through the payments industry. But are all -- or any -- of these payment schemes compliant with the <a href="http://www.csoonline.com/article/519563/the-great-pci-security-debate-of-2010-transcribed">Payment Card Industry Data Security Standard (PCI DSS?)</a>

George V. Hulme | 05 Jul | Read more

Symantec Uncovers Android Apps Security Threat

Android has quickly climbed to the top of the mobile OS mountain, and it owes much of its success to being a more open platform than rivals like iOS. However, that openness is a double-edged sword that also <a href="http://www.pcworld.com/businesscenter/article/223842/hacktivist_android_trojan_designed_to_fight_app_piracy.html">exposes Android to potential risk</a>--like the <a href="http://www.symantec.com/connect/blogs/android-class-loading-hijacking">Android Class Loading Hijacking</a> threat discovered by Symantec.

Tony Bradley | 01 Jul | Read more

Researchers Look at New Ways to Keep Your Information Safe

Since 1997 identity theft and fraud has affected more than 5.4 million people in the United States. And that number is on the rise with, more than 1.3 million complaints to the <a href="http://www.ftc.gov/sentinel/">Consumer Sentinel Network</a> (CSN) between January and December of 2009 alone. <a href="http://www.ftc.gov/sentinel/reports/sentinel-annual-reports/sentinel-cy2009.pdf">According to the Federal Trade Commission</a> (PDF), of the 721,418 fraud-related complaints to the CSN in 2009, this has cost customers [of various products and services] more than 1.7 billion dollars at a median payout of $399. But what can companies do to prevent fraud and identity theft?

James Mulroy | 30 Jun | Read more

Protect Your Company With Web Filtering Tools

Access to the Internet is vital for doing business, but without safeguards in place, malware and data leaks can be a mouse click away from disaster. Network firewalls and <a href="http://www.pcworld.com/reviews/collection/6706/top_paid_antivirus_for_2011.html">antivirus software</a> are common in workplaces, but more small companies are increasingly turning to Web filtering tools for additional protection.

Elsa Wenzel | 29 Jun | Read more

Symantec finds big differences in iOS, Android security

<a href="http://www.networkworld.com/slideshows/2009/060309-apple-quiz.html">Apple</a> iOS and Google <a href="http://www.networkworld.com/news/2010/110910-google-android-useful-resources-smartphones.html">Android</a> have some big differences when it comes to mobile <a href="http://www.networkworld.com/topics/security.html">security</a>, creating distinct potential vulnerabilities for enterprises embracing devices running these operating systems, according to analysis by Symantec.

John Cox | 29 Jun | Read more

Symantec compares iOS and Android security

Apple's iOS and Google's Android smartphone platforms are more secure than traditional desktop-based operating systems, but are still susceptible to many existing categories of attacks, according to<a href="http://www.symantec.com/about/news/release/article.jsp?prid=20110627_02&amp;om_ext_cid=biz_socmed_twitter_facebook_marketwire_linkedin_2011Jun_worldwide_mobilesecuritywp">a 23-page report from security software vendor Symantec.</a>

Mikael Ricknäs | 28 Jun | Read more

Left to your own devices

I've been watching a challenge grow on the horizon. It comes up over and over again in conversations with security and technology executives alike, and if it hasn't hit your organization yet...well, let's just say that it probably has and you're just missing it. It's the broad issue of mobility and the consumerization of IT. Simply put, it's all those fun little devices that your employees are bringing to you and saying "support me."

Bob Bragdon | 21 Jun | Read more

Eric Schmidt: Want security? Get a Mac

Speaking at the All Things Digital D9 conference, Google Executive Chairman Eric Schmidt said in a wide-ranging Q&A session that the best workstation security is offered by a Mac, coupled with Google's Chrome browser. Additionally, he suggests users of Google's services should activate two-step authentication -- introduced earlier this year -- which requires users to enter a code that's texted to their phone each time they log in on a new computer.

Keir Thomas | 02 Jun | Read more