Security Experts:

Mobile & Wireless
long dotted

NEWS & INDUSTRY UPDATES

Security researchers at Bitdefender have identified a highly sophisticated Android spyware platform that managed to remain undetected for four years. [Read More]
Comparitech researchers have discovered that thousands of Android applications distributed through Google Play leak sensitive information due to Firebase misconfigurations. [Read More]
Industry professionals comment on the security aspects of a newly launched alliance of over 30 tech and telecom firms calling for open and interoperable 5G systems. [Read More]
Samsung has patched a critical vulnerability impacting all of its devices since 2014 that can be exploited through malicious MMS (multimedia) messages, without user interaction. [Read More]
The Czech Republic and the United States have signed a joint declaration Wednesday for cooperating on security of 5G technology. [Read More]
More than 30 technology and telecom firms unveiled an alliance to press for "open and interoperable" 5G wireless systems that eliminate the need for a single supplier. [Read More]
As governments race to develop mobile tracing apps to help contain infections, attention is turning to how officials will ensure users’ privacy. [Read More]
Google this week released the May 2020 security patches for the Android operating system to address several critical vulnerabilities, including one affecting the System component. [Read More]
A threat actor managed to infect more than 75% of the devices within a company by distributing their Android malware through a mobile device management (MDM) server. [Read More]
Hackers could exfiltrate data from an air-gapped device over an acoustic channel even if the targeted machine does not have any speakers, by abusing the power supply. [Read More]

FEATURES, INSIGHTS // Mobile & Wireless

rss icon

Preston Hogue's picture
Telecom service providers need protections for everything from their back-end networks to cell towers to billions of devices in users’ hands.
Seema Haji's picture
Enormous bandwidth increases of 5G, the rapid expansion of edge computing and countless new IoT devices introduce risk despite their intended benefit.
Laurence Pitt's picture
As we continue to increase our dependency on communications networks and technologies to move tremendous amounts of data, we open up greater potential for serious disaster should they be compromised.
John Maddison's picture
There are three basic security components that every organization with an open BYOD strategy needs to be familiar with.
Laurence Pitt's picture
By paying just a bit more attention to the permissions you are allowing on your phone or computer, you could protect yourself from a much more significant headache down the road.
Alastair Paterson's picture
While less powerful than desktops and servers used for this purpose, more Android devices exist, and they are often less protected and, thus, more easily accessible.
Scott Simkin's picture
Users, networks and applications can – and should— exist everywhere, which puts new burdens on security teams to protect them in the same way as the traditional perimeter.
Alastair Paterson's picture
By understanding what’s up with your mobile apps, you can mitigate the digital risk to your organization, employees and customers.
Adam Ely's picture
In this day of BYOD devices and zero-trust operating environments, IT and security professionals gain nothing from trying to manage the unmanageable—which is just as well, because the device is no longer the endpoint that matters.
Simon Crosby's picture
While flexibility offers countless benefits for corporations and their employees, this new emphasis on mobility has also introduced a new set of risks, and this in turn re-ignites a focus on endpoint security.