News Articles

Mobile malware: 'criminals are experimenting at the moment'

Mark Bridge writes:

This week’s podcast feature takes a fresh look at security on mobile phones. I’ve been talking to Eddy Willems, Security Evangelist at G Data, about the challenges and solutions facing smartphone users. Both Eddy and his current employer have been active in digital security for a couple of decades, so there’s plenty of experience under their respective belts.

Author: The Fonecast
0 Comments
Article rating: No rating

Podcast - 11th November 2011

Eddy Willems, Security Evangelist at G Data, talks about mobile security threats. With the amount of mobile malware reported to have increased by 273% this year, Eddy explains what smartphone users can do - and what the mobile industry should be doing, too.

Author: The Fonecast
0 Comments
Article rating: No rating

Gemalto research says security concerns, not security problems, hampering NFC adoption

Consumer concerns about the security of NFC mobile contactless payments are causing a barrier to adoption, according to new research commissioned by digital security company Gemalto. The information has been released as part of the company’s campaign for better education around the subject of NFC.

Over a third of respondents - 34% - said they hadn’t used or wouldn’t use their phone as a mobile wallet due to security concerns, with 24% not trusting NFC because they didn’t understand how it worked.

Author: The Fonecast
0 Comments
Article rating: No rating

Security researcher demonstrates security flaw in Apple App Store review process

Security researcher Charlie Miller from Accuvant has found a flaw in Apple’s App Store, demonstrating how it’s possible to create a malicious application that is accepted into the store.

Although all apps need to pass Apple’s review process, Mr Miller created a ‘proof of concept’ app that appeared benign but was able to steal data after receiving an online update.

Author: The Fonecast
0 Comments
Article rating: No rating

Cortado offers a secure 'cloud desktop' without unnecessary restrictions

Mark Bridge writes:

Security is often a balancing act - and security on mobile devices is no exception. If procedures and processes aren't tough enough, you'll compromise the security of the information you're protecting. But if your security is too tight or if it seems too complicated to an end user, that user is likely to find a way round your security by doing something else instead.

Author: The Fonecast
0 Comments
Article rating: No rating
RSS
First3839404143454647Last

Follow thefonecast.com

Twitter @TheFonecast RSS podcast feed
Find us on Facebook Subscribe free via iTunes

Archive Calendar

«May 2024»
MonTueWedThuFriSatSun
293012345
6789101112
13141516171819
20212223242526
272829303112
3456789

Archive

Terms Of Use | Privacy Statement