Remote work/remote access means a larger attack surface -- and the inability to "disconnect" from work may be a factor
With the rise of remote and hybrid work, companies are more reliant than ever on mobile devices, and those devices are, increasingly, the main route...
A "significant lack of visibility into devices and networks" puts enterprises at risk, according to a new study.
The research, commissioned by NetMotion Software and conducted by Enterprise Mobility Exchange, found that almost half of mobile workers spend most of their time on non-corporate...
A new report from Allot Communications details the impacts when a mobile phone's processing power is hijacked for crypto currency mining, while other security researchers found vulnerabilities in diameter signaling that put mobile networks at risk.
Allot, in its Telco Security Trends report for the...
Mobile customers are increasingly worried about the security of their devices, and operators which cater to them with a network-based mobile security solution have higher customer satisfaction, according to a new report from Allot Communications. But the strategy on how security is positioned --...
Black Friday is fast approaching, and mobile holiday shopping is expected to continue its growth as users hunker down with their smartphones and tablets to make holiday purchases in addition to -- or instead of -- visits to retail stores.
Here are four predictions for...
"Much of what is already out there is unsecured"
Hacking and malware remain the primary vectors for cybersecurity attacks, according to the new Verizon Data Breach Investigations Report, and internet of things security is increasingly top-of-mind in the wake of a number of high-profile breaches late...
Mobile users are aware of online threats and a significant number have experienced a mobile malware attack in the past 12 months, according to a new survey by Allot Communications.
Allot found that 68% of surveyed mobile users are aware of malware and within that 68%,...
Cybersecurity is set to become more challenging in 2017, with IoT, DDoS, predictive analytics and automobiles just some of the segments.
Editor’s Note: With 2017 virtually upon us, RCR Wireless News has gathered predictions from across the mobile telecommunications space on what...
The use of biometrics for security by the mobile industry is growing, but partnerships are key to ensure continued development and deployment.
In today’s digital world, we rely on our mobile devices to save copious amounts of personal information. With the emergence of...
Mobile security does have a leg up on its desktop counterpart, though greater cooperation is needed.
Editor’s Note: With 2017 virtually upon us, RCR Wireless News has gathered predictions from leading industry analysts and executives on what they expect to see in...
Mobile operators should look to sports fans as a way to educate them on potential security threats and the opportunity to sell new services.
Mobile has changed the way people experience sporting events as fans shift to the digital arena to...
As the telecommunications space evolves to serve new segments like IoT and use new technologies like NFV and SDN, security remains a critical challenge
This is a time of great opportunity for communications service providers. Demand for all sorts of cloud-based services is on the...
Baidu provides 3 tips for operators looking to support a surge in data connected with the upcoming 2016 Summer Olympic Games in Brazil
With spectators streaming the events worldwide, athletes posting pregame rituals on social media and fans taking selfies in the stands, smartphone activity...
Kony lays out the 5 most common mobile security vulnerabilities and ways mobile application developers can surmount those issues
With the increasing adoption of mobile application development among both small and large organizations, security is a top concern – but are businesses focusing on the...
Much broader questions about security and privacy at stake, Apple argues; Woz weighs in
Apple and the FBI, engaged in an increasingly heated legal exchange over an alleged terrorist’s iPhone that has also sparked a national discussion about digital security, are set to meet in...
Graphite Software looks at ways to control data access on mobile devices for children
Poor, beleaguered parents these days. Not only do they have to wage daily battles with their kids about too much “screen time” at home, they have to track the security, privacy...
Ransomware, or malware designed to lock or encrypt files in order to extort payment from the victim, is expected to play a major role in cybersecurity this year, according to a new report from the Institute for Critical Infrastructure Technology.
Ransomware attacks spread through a number of...
Suddenly we are interested in security. Let me ask you a question: who has the most secure wireless phone? The vast majority would say BlackBerry. However, the current FBI vs. Apple case is changing everything we know about security. As a wireless analyst, I...
BARCELONA, Spain – Smartphones users haven’t realized yet the importance of protecting their mobile devices from hacker attacks, viruses and malware. In a video interview with RCR Wireless News, Gagan Singh, president for Avast's mobile division, noted that despite a growth in attacks on...
James Clapper said smart devices associated with Internet of Things pose security risk
In testimony to the Senate this week, Director of National Intelligence James Clapper highlighted the security risks posed by the emerging Internet of Things (IoT).
Clapper spoke on Tuesday to the Senate Armed...
When it comes to security, mobile devices pose a unique set of challenges. With the number of connected devices growing exponentially, the battle to protect information becomes more complex than ever. As capabilities of smart devices increase, so too does the number of ways...