August 14, 2012

Locking Down and Securing Your iPhone

Considering the rapid  proliferation of smartpones and tablets and the vast wealth of personal and financial data many of us store on them, it is increasingly important that we find ways of securing our mobile devices. With that in mind, we decided there was no better way to kick-off a series of security tutorials than with a short step by step video explaining simple ways of securing your iOS device.

Check Threatpost for more original videos moving forward

July 25, 2012

Ted Talk: Your phone company is watching

What kind of data is your cell phone company collecting? Malte Spitz wasn’t too worried when he asked his operator in Germany to share information stored about him. Multiple unanswered requests and a lawsuit later, Spitz received 35,830 lines of code — a detailed, nearly minute-by-minute account of half a year of his life.

 

June 28, 2012
Android Malware: A Threat Rising at a Meteoric Rate
Infographic via Kaspersky Lab
Check out Threatpost’s mobile security coverage for the specifics.

Android Malware: A Threat Rising at a Meteoric Rate


Infographic via Kaspersky Lab


Check out Threatpost’s mobile security coverage for the specifics.

June 5, 2012
Cloudflare CEO: AT&T Voicemail Hack Key To Compromise
Loose security protecting voice mailboxes at mobile carrier AT&T provided a key element necessary to successfully hack the Google Enterprise Apps account of tech firm CloudFlare, according to an account of the hack posted by CEO Matthew Prince.
Read more:
Infographic via Cloudflare

Cloudflare CEO: AT&T Voicemail Hack Key To Compromise

Loose security protecting voice mailboxes at mobile carrier AT&T provided a key element necessary to successfully hack the Google Enterprise Apps account of tech firm CloudFlare, according to an account of the hack posted by CEO Matthew Prince.

Read more:

Infographic via Cloudflare

May 22, 2012
Free Wi-Fi: Friend or Foe? Infographic via Veracode

Free Wi-Fi: Friend or Foe? Infographic via Veracode

March 23, 2012
2011 Sampling of Security Incidents by Attack Types, Time, and Impact
via IBM’s X-Force Trend and Risk Report
Spam volume is down, there are fewer unpatched software holes and oftware application developers did a better job of writing secure code over the last year. But IBM’s X-Force Trend and Risk Report still found plenty to worry about in 2011, according to a copy of the report released this week.  

2011 Sampling of Security Incidents by Attack Types, Time, and Impact

via IBM’s X-Force Trend and Risk Report

Spam volume is down, there are fewer unpatched software holes and oftware application developers did a better job of writing secure code over the last year. But IBM’s X-Force Trend and Risk Report still found plenty to worry about in 2011, according to a copy of the report released this week.  

February 27, 2012
Between MWC and RSA, Worlds of Mobility and Security Collide
Infographic via Juniper; Article via ReadWriteWeb
"Mobile World Congress, the largest and most important mobile conference of the year, starts this week in Barcelona. Meanwhile, about 6000 miles away in San Francisco, the RSA Conference brings together cryptographers and security geeks. These conferences, while seemingly unrelated, have more in common in 2012 than ever before."

Between MWC and RSA, Worlds of Mobility and Security Collide

Infographic via Juniper; Article via ReadWriteWeb

"Mobile World Congress, the largest and most important mobile conference of the year, starts this week in Barcelona. Meanwhile, about 6000 miles away in San Francisco, the RSA Conference brings together cryptographers and security geeks. These conferences, while seemingly unrelated, have more in common in 2012 than ever before."

January 4, 2012
iOS vs. Android Infographic: How Secure Are They?
(Infographic via VeraCode)
Check it out, then head over to Threatpost and read up on our Mobile Security coverage to decide for yourself!

iOS vs. Android Infographic: How Secure Are They?

(Infographic via VeraCode)

Check it out, then head over to Threatpost and read up on our Mobile Security coverage to decide for yourself!

August 18, 2011

As we reported yesterday(read for background), there is a phony, trojan infected ‘Dog War’ app floating around out there in Android land. Downloading results in some particularly humiliating repercussions. So check out these images (via Symantec) that should help you differentiate the real from the fraudulent.

August 16, 2011
The State of Mobile Malware via Mashable

The State of Mobile Malware via Mashable

Liked posts on Tumblr: More liked posts »