Beware of Android scaremongers
Smartphone malware may be rising, but users should be more wary of "charlatan" security vendors, says Google's open source program manager Chris DiBona.
Smartphone malware may be rising, but users should be more wary of "charlatan" security vendors, says Google's open source program manager Chris DiBona.
Darryl Boyett asked if his home WiFi connection, which uses WPA2 protection, is safe enough for online banking.
Lincoln Spector | 22 Nov | Read more
IBM has launched its Hosted Mobile Device Security Management Service aimed at enterprise trying to tackle mobile risks and the "bring your own device" trend.
If you operate a wireless network for your home or business, it's important to ward it against opportunistic hackers seeking to steal your data or hijack your Wi-Fi for their own nefarious purposes. We spoke to Steven Andrés, CTO of security consulting firm Special Ops Security, to learn about the best ways to lock down your Wi-Fi. To get started, you'll need to log in to your router's administrative console by typing the router's IP address into your Web browser's address bar. Most routers use a common address like 192.168.1.1, though alternatives like 192.168.0.1 and 192.168.2.1 are also common. Check the manual that came with your router to determine the correct IP address; if you've lost your manual, you can usually find the appropriate IP address on the manufacturer's website.
Alex Wawro | 12 Nov | Read more
Juniper Network's Tim Nagy speaks to CSO Australia.
As tablets and smartphones are entering the workplace en masse, we <a href="http://www.pcworld.com/businesscenter/article/242869/quick_poll_where_do_you_stand_on_mobile_devices.html">polled business managers and IT managers</a> on how they're handling the bring-your-own-device (BYOD) trend.
Logan G. Harbaugh | 05 Nov | Read more
People are accessing the internet (and their own corporate services) in changing ways, increasingly through a single mobile device. Focus is increasingly placed on smartphones to stay up-to-date socially and professionally, and the blurring of these roles poses new security challenges for all businesses.
Enex Testlab | 03 Nov | Read more
First there were sewing-machine sized portable PCs, then laptops, the Newton, the Palm Pilot, and phones with built-in PDA functions. The iPhone led the way to the ubiquitous smartphone, and the iPad ushered in an era of tablets. Now wireless hotspots, printers, storage, and a variety of other devices are making their way onto your office network, possibly without the knowledge of managers.
Logan G. Harbaugh | 03 Nov | Read more
The default settings for Apple’s new iPhone 4S personal assistant Siri allows anyone to give it commands when it’s password-locked.
On one wall of McAfee's expensive-looking executive briefing centre in Santa Clara, California, a live feed from the company's Global Threat Intelligence system displays the names of malware variants as they're detected in real time -- red LEDs on shiny black acrylic.
Stilgherrian | 19 Oct | Read more
Lookout, the company behind the most popular Android antivirus software, has released its first product for iOS iPhone and iPad devices.
Even apart from the serious security flaw in HTC Sense and malware that talks to an encrypted blog, to name just two recent issues, a consensus seems to be emerging. Android has serious security problems.
Stilgherrian | 14 Oct | Read more
In August 2010, hackers bent on jailbreaking Android smartphones found a vulnerability in the way the Android debugger handled an overwhelming number of processes. The code designed to exploit the flaw, dubbed RageAgainstTheCage, allowed users to reflash their smartphone and install custom firmware.
Robert Lemos | 06 Oct | Read more
According to industry analysts, mobile device shipments will exceed a billion devices in 2015 and will rapidly outrun PC shipments. That's great news for end user convenience, mobility, and work-anywhere productivity. But it also means that enterprises must brace for the fact that the <a href="http://www.csoonline.com/article/690905/iphone-and-ipad-security-the-human-element">bad guys will target these devices</a> with attack exploits, spyware, and rogue applications.
George V. Hulme | 06 Oct | Read more
It's a late night, and you've fired up Facebook on your ACME.com company-owned iPad to post some bad news. "A reduction in workforce is going to happen this week," you type into your update status field and tap the post button.
Tom Kaneshige | 05 Oct | Read more