Tag Archives: mobile devices

Store Systems Security: Preparing for the Retail System and Security Paradigm Shift

I was in an Office Depot the other day. There was one person in line at the checkout counter and another customer approaching the line. Then a sales clerk intercepted the person heading toward the line and said, “I can help you right here, sir.” The clerk had a mobile device in her hands. She swiped the customer’s credit card, … Read more

Posted in Mobile Security, Network Security, Security Management, Security Threats, Uncategorized | Tagged , , , , | Leave a comment

Gartner Sees Security Opportunity in Expanding Mobile Market

The proliferation of mobile devices is opening new opportunities for security vendors, but innovative approaches to the market are needed, Gartner Inc says in a new report. Ruggero Contu, research director at Gartner, says one of the challenges facing vendors is that consumer adoption and willingness to pay for antivirus software on mobile devices is low.

Posted in Mobile Security, Network Security, Security Management, Security Threats, Uncategorized | Tagged , , , , | Leave a comment

Thinking About How to Secure the Internet of Things (IoT)

Michael Cooney of Network World published a semi-silly article about malware affecting smart toilets that run the Android operating system. (See Just when you thought it was safe to go to the bathroom – toilet malware strikes.) The article reports that TrustWave SpiderLads issued a security bulletin to warn users of the software-controlled toilet that miscreants could take command of … Read more

Posted in Data Protection, Governance, Risk and Compliance, Mobile Security, Security Threats, Uncategorized | Tagged , , , , | Leave a comment

Industrial Plants Can Be Disrupted With a Remote

The wireless control systems used at many major infrastructure facilities have vulnerabilities which could allow a hacker with a radio frequency (RF) transceiver to close down a plant from up to 40 miles away; two security researchers told the Black Hat convention in Las Vegas. Lucas Apa and Carlos Mario Penagos Hollman of IOActive said in a presentation that they … Read more

Posted in Governance, Risk and Compliance, Mobile Security, Security Management, Security Threats, Uncategorized | Tagged , , , , | Leave a comment

Privacy Double Standard: You Can Track Online But Not On Foot

There’s an article in the New York Times about how retail stores are increasingly using technology to track customers’ movements and interests when they are physically in the stores. (Check out the article’s video to see some of this technology in action.) Stores use Wi-Fi signals from customers’ mobile phones to track where an individual goes within the store and … Read more

Posted in Data Protection, Mobile Security, Uncategorized | Tagged , , , , , , | Leave a comment

Don’t Write Your BYOD Policy from Scratch – Check Out These Samples to Jumpstart Your Own Policy

Whether or not your organization allows employees to use their personally owned devices to access corporate resources, you need to have a written policy that covers the acceptable use of mobile devices. This policy should clearly communicate to all employees what is, and is not, acceptable use of their smartphones, tablets and other mobile devices as it pertains to access … Read more

Posted in Application Security, Data Protection, Mobile Security, Network Security, Security Management, Uncategorized | Tagged , , , , , , | Leave a comment

Music, Light Used to Trigger Malware on Mobiles

Researchers at the University of Alabama at Birmingham say they have developed and tested malware that can be triggered on a smartphone using light, sound, magnetic fields or vibration – posing a critical new cyber-security threat.

Posted in Mobile Security, Network Security, Security Management, Security Threats | Tagged , , | Leave a comment

Password Problems: Majority Of Security Pros Violate A Big Mobile Best Practice

Even security pros practice poor security “hygiene,” with some 83 percent saying they use the same password across multiple mobile applications, according to a new survey. This figure, and others, comes by way of Ping Identity’s ‘Impact of Mobile’ Survey, which surveyed 198 attendees at this year’s RSA Conference. The survey sought to discover how work habits are changing as … Read more

Posted in Application Security, Mobile Security, Uncategorized | Tagged , , | Leave a comment

That Really Cool App You Put on Your Smart Phone is Probably Collecting All Sorts of Information – and You Don’t Even Know It

A few weeks ago I warned that mobile applications may not behave the way that users expect them to. (See “App Happy Downloaders May Get More Than They Expect.”) As a follow-up to that post, I talked more in-depth with Domingo Guerra, president and co-founder of Appthority. Guerra’s company has analyzed hundreds of thousands of mobile apps to discover what … Read more

Posted in Mobile Security | Tagged , , , | Leave a comment

Do Mobile Devices Really Increase Productivity?

While there is little doubt that mobility options provide a great deal of flexibility when it comes to where and when work related tasks can be accomplished, and provide for more efficient means of employee collaboration and access, does it really have an impact on productivity? According to a newly published study, federal government employees who utilize mobile devices in … Read more

Posted in Mobile Security | Tagged , , , , | Leave a comment