Category Archives: Mobility

Playing in the Digital Sandbox: Mobile versus Desktop Security

January 27, 2014 by Jason Soroko     No Comments

Mobile operating systems consume resources from unknown sources on the Internet all the time, and yet they are not infected in the same manner as desktop operating systems. Certainly, sideloaded malicious Android apps are able to access parts of a mobile device that the user has authorized (e.g., pictures, contacts, SMS).  We have also seen [Read More...]

Filed Under: Malware, Mobility Tagged With: mobile security, sandbox

Mobile Malware — Will it Expand in 2014?

January 20, 2014 by Entrust, Inc.     No Comments

This comes as no surprise, but the bring-your-own-device (BYOD) movement has reached critical mass.  More and more enterprises are leveraging mobile to share information, complete transaction or increase business efficiency. In fact, 67 percent of organizations use personal devices at work, and 42 percent of companies surveyed now allow BYOD at the enterprise level.  Unfortunately, [Read More...]

Filed Under: General, Malware, Mobility Tagged With: EW, malware, mobile

Can You Spot a Phishing Email?

December 18, 2013 by Entrust, Inc.     No Comments

This holiday season, buyers everywhere will flock to the Internet to rack up savings on deals and avoid the hassles of shopping in malls and department stores. Unfortunately, shopping online without using caution can lead to great headaches due to the prevalence of criminal activity. One of the most devastating identity theft techniques comes in [Read More...]

Filed Under: Malware, Mobility, Secure Browsing Tagged With: phishing

Top 10 Holiday Scams to Steer Clear of this Season – Part 2

December 16, 2013 by Entrust, Inc.     No Comments

This is Part 2 of a two-part series. To read the first post, click here. Top 10 Holiday Scams to Steer Clear of this Season 6. Order shipment notification When doing your holiday shopping, always make sure that the email notification confirming your order shipment is directly tied to the official company of which you [Read More...]

Top 10 Holiday Scams to Steer Clear of this Season – Part 1

December 12, 2013 by Entrust, Inc.     1 Comment

Top 10 Holiday Scams to Steer Clear of this Season You have spent all night looking for the perfect gift online for your spouse, children or significant other. After hours of searching, you finally come across the ultimate package certain to grant you a lifetime pass to the Nice List — two tickets to the [Read More...]

Filed Under: Mobility Tagged With: holiday, mobile security

Bypassing Fingerprint Biometrics Nothing New

October 2, 2013 by Jason Soroko     No Comments

So, Germany’s Chaos Computer Club — which weirdly sounds like an outcast AV group at someone’s high school — claims to have circumvented Apple’s new Touch ID fingerprint biometric sensor featured on the just-released iPhone 5s. This isn’t news. Sure, it’s new in relation to attacking the consumer-loved iPhone image. But the “hack” shown is [Read More...]

Filed Under: Identity Assurance, Mobility Tagged With:

iPhone 5s Gains Biometric Authentication via ‘Touch ID’ Home Button

September 10, 2013 by Entrust, Inc.     No Comments

Biometric security is once again moving to the forefront of mobile technology. During Apple’s unveiling of the new iPhone 5s today, one of the newest features is the introduction of a fingerprint reader to add consumer-level biometric authentication. It is the first major U.S.-based mobile manufacturer to incorporate a fingerprint scanner since Motorola released the [Read More...]

Filed Under: Identity Assurance, Mobility Tagged With: biometric, EW, iPhone

Digital Certificates on Your Phone?

September 9, 2013 by Matthew Lewis     No Comments

It’s not a Peyton Manning TV spot, but it’s certainly more important to the security of your identities. In Entrust’s recent infographic, “Mobile Security: Perception vs. Reality,” a third-party study found that 38 percent of enterprises have or plan to implement mobile device certificates in 2013. But there is also the myth that certificate-based identities [Read More...]

Software Tokens: Simplifying Digital Security

September 5, 2013 by Entrust, Inc.     No Comments

Picture this scenario: you left your apartment for a business trip, and are sitting on the plane ready to take off when you realize you are missing something. You rummage through your carryon bag, when it hits you: you have left your hardware security token sitting on top of your bureau.  How are you going [Read More...]

Not All Multifactor Authentication Techniques are Equal

September 4, 2013 by Jason Soroko     No Comments

This fact seems to be lost on some who are responsible for security architecture. One of my reflections on this past summer is that not everyone is aware of the difference between weaker and stronger forms of multifactor authentication. You have likely read about multifactor authentication, have used it with your social networking websites, or [Read More...]