Browsing Category: Mobile Security

Categories: Apple, Mobile Security

It’s nearly impossible to remember now, but there was a time when the iPhone didn’t exist. That time was five years and one day ago, and up to that point the idea of standing in line overnight for a mobile phone was almost as ridiculous as the notion of Apple being thought of as an innovator in security. But the former is now commonplace and the latter is straight fact, if only in discussions about the iPhone.

Read more...

Categories: Mobile Security, Privacy

Text messages are great, but they have the annoying property of being out of the sender’s control as soon as they’re sent. That’s resulted in all kinds of fun for the Internet, and it’s also presented a big opportunity for a security company to pick up the slack and impose some sanity and privacy on these communications. A new start-up called Wickr is aiming to do just that with a mobile app that enables users to send anonymous, encrypted texts, photos and videos that self-destruct after a set time period and leave no trace for snoops.

Read more...

Categories: Mobile Security

Many people would consider themselves lucky to be a part of one successful start-up company, but for a select group of entrepreneurs, engineers and executives, that’s just the beginning. Such is the case for the team behind new mobile security firm Bluebox, a stealth-mode company that counts SPI Dynamics founder Caleb Sima and Adam Ely, a former top security official at Salesforce.com and Disney among its key executives and has just raised $9.5 million in funding.

Read more...

Categories: Mobile Security

The Finland-based security firm F-Secure is warning companies to beware of Siri, the voice-activated personal assistant app that last month was banned by IBM for security purposes.The potential for Siri-based data disclosures was cited at a Helsinki press conference, in which F-Secure’s vice president, Maria Bordgren, said that Apple’s lack of known corporate security policies leave enterprises vulnerable. Siri queries and other information are stored as text in Apple’s data centers.

Read more...

Categories: Mobile Security, Privacy

As smartphone technology evolves so does the way we access and interact with the Internet. Today your smartphone is used both as a phone and a computer. For many users, in 3-5 years your smartphone will also become your wallet. With new applications being developed daily, the mobile payments market is expected to reach unprecedented  growth by 2014. As this market rapidly expands, is security taking a back seat to technology?

Read more...

Categories: Mobile Security

Google’s Android platform has become the most popular mobile operating system both among consumers and malware writers, and the company earlier this year introduced the Bouncer system to look for malicious apps in the Google Play market. Bouncer, which checks for malicious apps and known malware, is a good first step, but as new work from researchers Jon Oberheide and Charlie Miller shows, it can be bypassed quite easily and in ways that will be difficult for Google to address in the long term.

Read more...