Mobile Security

BlackBerry security revisited: How do the BB10’s stack up?

Following the ground up overhaul of the BlackBerry operating system and accompanying launch of their new flagship smartphones last year, we wondered how they really stack up–security wise–against the other smartphones you might already have in your pocket or purse right now. How do new devices running Blackberry 10–as the new OS is called–compare to

BlackBerry signs up to FIDO anti‑password alliance to seek new ways to keep data safe

BlackBerry has signed up to FIDO (Fast IDentity Online) Alliance – a group which is seeking to establish new methods to identify people quickly and safely, rather than relying on passwords for mobile security. FIDO is supported by internet giants such as Google and PayPal and is investigating alternative authentication technologies such as NFC chips, biometrics and one-time passwords, with a view to creating a standards-based system for passwordless authentication.

Fake iPhone charger can hack iOS in under 60 seconds

A fake iPhone charger could be used to bypass the defenses of Apple's smartphone, three researchers from Georgia Tech have claimed. In an upcoming presentation at this summer’s Black Hat security conference in Las Vegas, the researchers claim to have created a “malicious charger” which can inject software into an iOS device in under a minute.

Five tips to stay safer using Wi‑Fi in public places

Want to be safer online using your laptop or tablet when using public Wi-Fi? You can. Here are our five essential tips. 1 First, if you are not going to use the Internet it’s a good idea to turn off Wi-Fi connectivity completely on your laptop, smartphone or tablet. You are then guaranteed that your

Rogue mobile devices in your enterprise? RSA day one

While our recent post on BYOD focuses on the prevalence and/or risk of inadequately trained staff potentially creating problems for the core IT infrastructure using their own personal devices for work, it seems others here at RSA are concerned with preventing the exact same thing, but from a different angle. I attended one “lighting round”

Mobile Devices Favor Malware and Phishing

A while back a malicious program called DroidDream was found on the Google Marketplace. The thing about DroidDream is that it exploited a vulnerability that gave it root access. Now contrast how Google treats security software. Security applications are not allowed to have root access. The truth is that the most popular mobile platforms (and

Google Android and Really Bad Math

Yesterday I blogged about a security company that found a high percentage of apps for the iPhone and for the Android were stealing user information. I call it stealing because the user is not aware of what personal data is leaving their phone. At the Blackhat Security Conference in Las Vegas the same company, Lookout