• Dissecting the Risks, Means and Countermeasures of Mobile Banking

    According to a recent Deloitte study, “Mobile Financial Services: Raising the Bar on Customer Engagement,” 61 percent of respondents cited security as the main reason they did not conduct banking with mobile devices. What did this survey miss about their study's participants and who will benefit most when secure mobile-based banking is the norm?

        in Mobile Security, Mobility
    0
  • Infosecurity Europe: Entrust Shows Off Cloud, Mobile Solutions

    What an amazing week at Infosecurity Europe. Hosted at the Earls Court Exhibition Centre, Europe’s No. 1 information security event gave event-goers — at least those who weren’t able to make it to RSA 2014 in San Francisco — a first-hand look at Entrust’s latest solutions, including the new Entrust IdentityGuard Cloud Services. Running daily at Booth G45, Entrust tackled some of

        in Cloud Security, Malware, Mobility
    0
  • Playing in the Digital Sandbox: Mobile versus Desktop Security

    Mobile operating systems consume resources from unknown sources on the Internet all the time, and yet they are not infected in the same manner as desktop operating systems. Certainly, sideloaded malicious Android apps are able to access parts of a mobile device that the user has authorized (e.g., pictures, contacts, SMS).  We have also seen flaws in mobile browsers that

        in Malware, Mobility
    0
  • Mobile Malware — Will it Expand in 2014?

    Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:”Table Normal”; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:””; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:”Calibri”,”sans-serif”; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} This comes as no surprise, but the bring-your-own-device (BYOD) movement has reached critical mass.  More and more enterprises are leveraging mobile to share information,

        in General, Malware, Mobility
    0
  • Playing in the Digital Sandbox: Mobile versus Desktop Security

    Mobile operating systems consume resources from unknown sources on the Internet all the time, and yet they are not infected in the same manner as desktop operating systems. Certainly, sideloaded malicious Android apps are able to access parts of a mobile device that the user has authorized (e.g., pictures, contacts, SMS).  We have also seen flaws in mobile browsers that

        in Malware, Mobility
    0
  • Mobile Malware — Will it Expand in 2014?

    Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:”Table Normal”; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:””; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:”Calibri”,”sans-serif”; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} This comes as no surprise, but the bring-your-own-device (BYOD) movement has reached critical mass.  More and more enterprises are leveraging mobile to share information,

        in General, Malware, Mobility
    0
Page 1 of 16123...51015...»»