Magazine Button

Mobile

Five critical elements for any cybersecurity awareness programme

To combat mobile cyber threats, organisations must educate employees about the risks associated with accessing critical business apps on personal devices. Doros Hadjizenonos, Regional Sales Director at Fortinet,  explores the five critical elements that CISOs should include in any cybersecurity awareness training. While nearly nine in 10 companies not only allow, but actually rely on their employees to access […]


Thales first to reach highest level of certification possible for mobile ID security software

Thales, a world leader in digital security, is the first company to achieve the highest level of the international security standard ‘Common Criteria’ for its mobile ID software solution. The Gemalto Mobile ID software has demonstrated a level of resistance to the most advanced security penetration tests against mobile applications. This security breakthrough confirms that […]


Study shows 93% of attempted mobile transactions were fraudulent

A total of 93% of total mobile transactions in 20 countries were blocked as fraudulent in 2019, according to a report on the state of malware and mobile ad fraud released by mobile technology company, Upstream. The Invisible Digital Threat data is based on deployments of Upstream’s Secure-D full-stack anti-fraud platform that that detects and […]


TikTok vulnerability let hackers access parts of users’ accounts

It has been reported that multiple vulnerabilities have been found within smartphone video sharing app, TikTok, which it now says have been fixed. The vulnerabilities had the potential to allow hackers to manipulate content and extract personal data, according to Israeli-based cybersecurity company, Check Point. Researchers found that it was possible to spoof text messages to make […]


Sophos introduces Intercept X for Mobile

Sophos, a global leader in next-generation cybersecurity, has introduced Sophos Intercept X for Mobile with new security capabilities for Chrome OS devices and improved mobile threat defence for Android and iOS devices. Sophos has also published research, Fleeceware Apps Persist on the Play Store, that details new findings on Fleeceware applications that overcharge unsuspecting consumers […]


F5 Networks expert on why securing apps and passwords are being ignored

Despite education and constant reminders that security is everyone’s responsibility, Lori MacVittie, Principal Threat Evangelist, F5 Networks, says that the most basic of security practices is being completely ignored when it comes to apps and passwords. “There’s an app for that” has become reality rather than just a catchy marketing phrase. According to a compilation of […]


Mobile service providers preparing to fortify security in anticipation of 5G deployments

According to a global survey fielded by the Business Performance Innovation (BPI) Network, in partnership with A10 Networks, mobile service providers anticipate significant new revenue opportunities from the forthcoming deployment of high-speed 5G networks and a host of new IoT-driven use cases, but they also believe much-improved security will be essential to realising that potential. […]


MobileIron integrates with Zebra Technologies’ LifeGuard for Android solution

MobileIron has announced that it has integrated with Zebra Technologies’ LifeGuard Over The Air (OTA) for Android security solution, providing robust security and management while enabling front-line workers with secure mobile productivity on their Zebra enterprise-class devices.  LifeGuard for Android, a security lifecycle offering for enterprise-class mobile computers, extends the service life of Zebra’s Android-based […]


Protecting the manufacturing industry from mobile phishing attacks

The rapidly rising reliance on mobile phones in the workplace has facilitated an increased cybersecurity threat from malicious phone hackers that many manufacturers are not equipped to handle. Tom Davison, EMEA Technical Director at Lookout, outlines the steps that both individuals and businesses must take to ensure the security of their most valuable assets, with […]


5G architecture and technologies and their impact on security

The emerging 5G Core represents a significant shift in technology and architecture. The foundation is a cloud-native architecture built on the same technologies used extensively in cloud services. This provides huge scope for a flexible, service driven, agile and dynamic network which will allow operators to capitalise on significant new revenue opportunities for rich and […]


Browse our latest issue

Intelligent CISO

View Magazine Archive