Categories Topics
Mobile Device Security

Mobile devices, such as cell phones, tablets and PDA's, have become invaluable tools for today's mobile work force.  Mobile devices make it easier to handle e-mail, store documents and remotely access data.  With this added flexibility comes an increasing need to implement security measures to protect mobile devices and data access mechanisms.

Various threats to handheld devices include, but not limited to:
  • Loss or theft of device
  • Wireless interfaces (e.g., WiFi, Bluetooth) that are not secured
  • Unauthorized access to sensitive information (such as e-mail that may contain account names, passwords, etc.)
  • Phishing or other social engineering tricks to lure users to malicious sites or download malware
  • Electronic eavesdropping and tracking

The following security safeguards should be followed to enhance the security of mobile devices:

  • Maintain physical control and oversight of mobile device at all times or secure when not attended
  • Enable user authentication such as a unique PIN, set maximum password attempts and ensure device is set to "auto-lock" when not in use
  • Backup data stored on mobile device regularly
  • Reduce sensitive data stored on mobile devices (such as account numbers or passwords); if information is needed, ensure appropriate encryption of data
  • Ensure device configured to use communication protocols that use authentication and encryption to protect information in transit
  • Be cautious of questionable e-mail, SMS text messages or incoming connections from untrusted sources.  Attachments can include malware used to infect devices and steal personal information
  • Disable wireless interfaces, such as Bluetooth or WiFi, until they are needed
  • Avoid setting Bluetooth to discovery mode (unless pairing with another device) to avoid discovery attempts by malware or unauthorized access
  • Deactivate lost or stolen devices; mechanisms can include remote erasing device or disabling use by GSM carrier
  • Disable any unneeded features or application plugins; the more components added, the higher likelihood of introducing vulnerabilities that could be exploited
  • Prevention and detection software to defend against malware
  • Ensure devices are kept up to date with latest patches and upgrades to address vulnerabilities
  • Implement data loss prevention mechanisms to ensure personal devices cannot be used to connect to company computers (e.g. sync via USB port) to remove sensitive information
Many of the above security measures above can be simplified by using a centralized configuration management system to remotely manage security, logging and configuration settings of mobile devices to meet company policy and standards.

Topic Category
Operations and Communications Management
News Articles
Apple Removes iPhone USB Access Feature, Blocking Out Hackers, Law Enforcementthreatpost.com6/14/2018
Google will force Android OEMs to push out security patches regularlywww.helpnetsecurity.com5/18/2018
Samsung Patches Six Critical Bugs in Flagship Handsetsthreatpost.com5/14/2018
Popular Sonic the HedgeHog Apps at Risk of Leaking User Data to Unverified Serversthreatpost.com1/22/2018
Beware! A new bug can crash iOS and macOS with a single text messagewww.grahamcluley.com1/17/2018
Android vulnerability allows attackers to modify apps without affecting their signatureswww.helpnetsecurity.com12/11/2017
Banking Apps Found Vulnerable to MITM Attacksthreatpost.com12/7/2017
Just one day after its release, iOS 11.1 hacked by security researcherswww.zdnet.com11/2/2017
iOS apps can read metadata revealing users' location
New BankBot Android Malware Variant Exclusively Targets Google Playwww.tripwire.com9/26/2017
What’s New In Android 8.0 Oreo Securitythreatpost.com9/22/2017
Red Alert 2.0: New Android banking trojan can block and log incoming calls from bankswww.tripwire.com9/19/2017
Disney slammed with class-action complaint for unlawfully exfiltrating kids' personal datawww.grahamcluley.com8/8/2017
How the CopyCat malware infected Android devices around the worldblog.checkpoint.com7/6/2017
Ztorg malware hid in Google Play to send premium-rate SMS texts, delete incoming SMS messageswww.grahamcluley.com6/21/2017
'Ultrasecure' Samsung Galaxy S8 iris scanner can be easily tricked, say hackerswww.zdnet.com5/23/2017
Verizon Messages App Allowed XSS Attacks Over SMSwww.securityweek.com5/22/2017
Hundreds of Apps Can Listen for Marketing ‘Beacons’ You Can’t Hearwww.wired.com5/2/2017
NSA suggests using virtualization to secure smartphoneswww.networkworld.com5/1/2017
FalseGuide malware dupes 600,000 Android users into joining botnetwww.zdnet.com4/25/2017
Millions Download "System Update" Android Spyware via Google Playwww.securityweek.com4/20/2017
When flashlights attack, Android passwords get stolenwww.scmagazine.com4/19/2017
Security researcher blasts Tizen: 'May be the worst code I've ever seen'www.networkworld.com4/14/2017
Android O no! Android O causes problems for mobile ransomware
Cisco Releases Security Updates (mobility and wireless products)
Total-Takeover iPhone Spyware Lurks on Android, Toowww.wired.com4/6/2017
Don’t pay for what is for free: Malicious Adobe Flash Player app found on Google Playwww.welivesecurity.com4/4/2017
Apple Releases Security Update for iOS (10.3.1)
Apple iCloud hack threat gets worse: Here's what we've learnedwww.zdnet.com3/28/2017
Ransom scam exploits Apple iOS Safari flaw to target porn viewerswww.zdnet.com3/28/2017
Lack of security patching leaves mobile users exposedwww.helpnetsecurity.com3/24/2017
Malware found pre-installed on dozens of different Android deviceswww.grahamcluley.com3/13/2017
Apple to iPhone owners: We're working fast to block CIA's iOS hackswww.zdnet.com3/8/2017
Android gets patches for critical OpenSSL, media server and kernel driver flawswww.computerworld.com3/7/2017
Samsung mulls iris scanners on smartphones to log into Windows PCswww.computerworld.com2/26/2017
Netflix treats security ills with Stethoscope: Open-source self-probing
Insecure Android apps put connected cars at riskwww.computerworld.com2/17/2017
Thousands of Android Devices Infected by Marcher Trojanwww.securityweek.com2/13/2017
Google plans purge of Play Store apps without privacy policieswww.zdnet.com2/9/2017
Popular iOS Apps Vulnerable to TLS Interception Attacksthreatpost.com2/7/2017
"Charger" ransomware removed from Google Playwww.scmagazine.com1/27/2017
Remote attackers can force Samsung Galaxy devices into never-ending reboot loopwww.helpnetsecurity.com1/27/2017
Can you trust your Android VPN client?www.helpnetsecurity.com1/26/2017
Researchers predict upsurge of Android banking malwarewww.helpnetsecurity.com1/23/2017
Android Scoring System Roots Out Malicious, Harmful Appsthreatpost.com1/19/2017
China clamps down on app stores in bid to curb malwarenakedsecurity.sophos.com1/19/2017
Want to crash anyone's iPhone? Send this textwww.computerworld.com1/19/2017
Devs reverse-engineer 16,000 Android apps, find secrets and keys to AWS
Trojanized Photo App on Google Play Signs Up Users for Premium Servicessecuringtomorrow.mcafee.com1/13/2017
Website Malware Targets Mobile Platformsblog.sucuri.net1/2/2017
Android Trojan Performs DNS Hijacking Attacks against Wireless Routerswww.tripwire.com12/28/2016
Apple gives iOS app developers more time to encrypt communicationswww.networkworld.com12/23/2016
Mobile banking trojans adopt ransomware featureswww.computerworld.com12/19/2016
More Android-powered devices found with Trojans in their firmwarewww.helpnetsecurity.com12/13/2016
Apple Fixes 12 Vulnerabilities in iOS 10.2threatpost.com12/12/2016
AirDroid updated to patch MITM exposurewww.scmagazine.com12/9/2016
Google patches Dirty Cow vulnerability in latest Android security updatewww.zdnet.com12/6/2016
Never Ever (Ever) Download Android Apps Outside of Google Playwww.wired.com12/4/2016
Researchers find a way to bypass the iOS activation lockwww.computerworld.com12/2/2016
Gooligan Android malware grabs a million Google accounts in huge Google Play fraudwww.zdnet.com12/1/2016
Comodo Detects New Family of Sophisticated Financial Malwareblog.comodo.com11/22/2016
More Androids carry phone-home
Android banking malware whitelists itself to stay connected with
Security bods find Android phoning home. Home being
Researchers reveal WiFi-based mobile password discovery attackwww.helpnetsecurity.com11/14/2016
iOS 10.2 will make your local iPhone backup much much harder to crackwww.tripwire.com11/9/2016
Bug in Chrome for mobile exploited for drive-by Android malware downloadswww.helpnetsecurity.com11/8/2016
Mobile Applications Leak Device, Location Datathreatpost.com10/20/2016
Ghost Push malware continues to haunt Android userswww.tripwire.com10/17/2016
Sierra Wireless Warns Cellular Data Gear Targeted by Mirai Malwarethreatpost.com10/17/2016
Popular Android App Leaks Microsoft Exchange User Credentialsthreatpost.com10/14/2016
Android Banking Trojan Asks for Selfie With Your IDblogs.mcafee.com10/13/2016
Samsung Knox flaws open unpatched devices to compromisewww.helpnetsecurity.com10/4/2016
$1.5 Million Reward Announced for Remote Jailbreak of iOS 10www.tripwire.com9/30/2016
Helper for Haima iOS App Store Adds More Malicious Behaviorblog.trendmicro.com9/30/2016
Android.Lockscreen ransomware now using pseudorandom
Scammers spoof TaiG, offer fake iOS
Researchers Find ‘Severe’ Password Security Hole with iOS 10 Backupsthreatpost.com9/23/2016
Hardware Hack Bypasses iPhone PIN Security Counterblogs.mcafee.com9/22/2016
Mobile users actively spammed from compromised iCloud accountswww.helpnetsecurity.com9/19/2016
Android apps based on Adobe AIR SDK send out unencrypted datawww.helpnetsecurity.com9/15/2016
DualToy Windows Trojan Attacks Android, iOS Devicesthreatpost.com9/14/2016
Hack Brief: Beware the Spammy Pokemon Go Apps Being Pushed to Millions of iPhoneswww.wired.com9/12/2016
Gugi banking Trojan outsmarts Android 6 securitywww.helpnetsecurity.com9/7/2016
Google Shuts Down Potentially Massive Android Bugthreatpost.com9/7/2016
Google's 3-level Android patch may cause confusionwww.computerworld.com9/6/2016
40 apps containing DressCode malware family found on Google Playwww.scmagazine.com9/5/2016
Nullbyte ransomware going after Pokemon Go playerswww.scmagazine.com9/2/2016
Apple Issues Emergency Fix for iOS Zero-Days: What You Need to Knowwww.securityweek.com8/26/2016
Trident: Trio of iOS zero-days being exploited in the
Apple Releases Security Update (iOS 9.3.5)
Android 7.0 Nougat is out, with new security featureswww.helpnetsecurity.com8/23/2016
Four in five Android devices inherit Linux snooping
Marcher steps up game: Malware poses as security update, imitates popular appswww.scmagazine.com8/17/2016
Attackers can hijack unencrypted web traffic of 80% of Android userswww.helpnetsecurity.com8/16/2016
Samsung releases Galaxy S6 Edge update, includes patch for a critical security vulnerabilitywww.scmagazine.com8/12/2016
Bluetooth Hack Leaves Many Smart Locks, IoT Devices Vulnerablethreatpost.com8/11/2016
iOS 9.3.4 released, fixing critical security hole. Update nowwww.hotforsecurity.com8/5/2016
Apple Releases Security Update (iOS 9.3.4)
Cybersecurity Tips for the Rio
Protecting Android with more Linux kernel defensessecurity.googleblog.com7/27/2016
Another media-stealing app found on Google
SMS-based two-factor authentication may be headed out the doorwww.computerworld.com7/26/2016
Hacker steals 1.6 million accounts from top mobile game's forumwww.zdnet.com7/22/2016
Snowden Designs a Device to Warn if Your iPhone’s Radios Are Snitchingwww.wired.com7/21/2016
Stagefright-like Bug Affects iPhones and Macs, Warns Security Researcherwww.tripwire.com7/21/2016
Update Your Pokémon Go App Now to Fix That Privacy Messwww.wired.com7/12/2016
Malicious Pokémon GO App Spreading DroidJack RATwww.tripwire.com7/11/2016
Android Nougat will stop password-reset ransomwarewww.zdnet.com7/6/2016
This Android malware has infected 85 million devices and makes its creators $300,000 a monthwww.zdnet.com7/5/2016
Android Malware Targets Europe via Smishing Campaignswww.securityweek.com6/28/2016
Ransomware now locks your smart TV - and then demands Apple iTunes giftswww.zdnet.com6/14/2016
Latest Android Security Bulletin Heavy on Critical Qualcomm Flawsthreatpost.com6/6/2016
Runkeeper: A fitness app or a tracking app?www.helpnetsecurity.com5/16/2016
Study: Apple, Android should better vet app stores, notify users of 'dead apps'www.scmagazine.com5/10/2016
Malware may abuse Android’s accessibility service to bypass security
Google: We run 400M phone security checks per daywww.cnbc.com4/20/2016
FBI bought exploit from hackers to access San Bernardino iPhonewww.computerworld.com4/13/2016
Apple fixes iPhone passcode bypass flaw server-side, without having to push out an updatewww.tripwire.com4/7/2016
FBI to help U.S. agencies unlock encrypted deviceswww.computerworld.com4/3/2016
Apple updates its products, fixes iMessages zero-daywww.helpnetsecurity.com3/22/2016
Google warns of Android flaw used to gain root access to deviceswww.networkworld.com3/22/2016
Android mobile banking trojan uses layered defenses to avoid removalwww.scmagazine.com3/10/2016
Tim Cook defends Apple's refusal to help the FBI in new interviewwww.networkworld.com2/26/2016
New Android Trojan “Xbot” Phishes Credit Cards and Bank Accounts, Encrypts Devices for Ransomresearchcenter.paloaltonetworks.com2/18/2016
Major banks to roll out ATMs that use smartphones for authenticationwww.scmagazine.com2/2/2016
Critical Wi-Fi Flaw Patched on Androidthreatpost.com2/1/2016
New Android ransomware uses clickjacking to gain admin privilegeswww.computerworld.com1/27/2016
Samsung security update fixes critical bugs hidden in Galaxy devices, Android OSwww.scmagazine.com1/27/2016
Google fixes dangerous rooting vulnerabilities in Androidwww.computerworld.com1/5/2016
New Android-infecting malware brew hijacks devices. Why, you ask? Your
SlemBunk: An Evolving Android Trojan Family Targeting Users of Worldwide Banking Appswww.fireeye.com12/17/2015
Trojanized adware family abuses accessibility service to install whatever apps it wantsblog.lookout.com11/19/2015
Hacker claims $1 million iOS 9 exploit bountywww.zdnet.com11/3/2015
Baidu Android app component puts 100 million devices at riskwww.computerworld.com11/2/2015
Researchers Find 85 Percent of Android Devices Insecurethreatpost.com10/14/2015
UL creating standard for wearable privacy and securitywww.computerworld.com10/13/2015
Apple excommunicates adblockers that could access users' private datnakedsecurity.sophos.com10/12/2015
Apple iPhone malware alert: YiSpecter hid in App Store for 10 months [u]www.computerworld.com10/5/2015
Stagefright 2.0: New vulnerabilities leave a billion Android devices at
Mobile Ad Networks Leveraged in Large DDoS Attack, Reports CloudFlarewww.tripwire.com9/28/2015
Change this setting to stop Siri spilling your selfies!nakedsecurity.sophos.com9/24/2015
Chinese ad firm pwns Android users, creates hijackable global
Apple tells devs to validate Xcode after App Store malware breachwww.zdnet.com9/23/2015
Apple Removes 300 Infected Apps from App Storewww.wired.com9/21/2015
Bug in iOS and OSX Allows Writing of Arbitrary Files Via AirDropthreatpost.com9/16/2015
Android 5 lock-screens can be bypassed by typing in a reeeeally long password. In
Google Android Stagefright flaw exploit code releasedwww.zdnet.com9/10/2015
Aggressive Android ransomware spreading in the USAwww.welivesecurity.com9/10/2015
U.S. workers roll the dice by gambling on their company phonewww.scmagazine.com9/3/2015
Malware targeting Android on the rise: Reportwww.cnbc.com9/2/2015
KeyRaider Malware Steals Certificates, Keys and Account Data From Jailbroken iPhonesthreatpost.com8/31/2015
Another Popular Android Application, Another Leakwww.fireeye.com8/19/2015
Google has another try at patching Stagefright flawwww.computerworld.com8/14/2015
Zero-Day Deserialization Vulnerability Affects 55% of Android Deviceswww.tripwire.com8/11/2015
Android MediaServer Bug Traps Phones in Endless Rebootsblog.trendmicro.com8/4/2015
Android Stagefright Flaws Put 950 Million Devices at Riskthreatpost.com7/27/2015
Bug in Android ADB Backup System Can Allow Injection of Malicious Appsthreatpost.com7/9/2015
Bug in Android ADB Backup System Can Allow Injection of Malicious Appsthreatpost.com7/9/2015
Samsung to stop Windows Update shenaniganswww.computerworld.com6/27/2015
Samsung announces fix for major Galaxy keyboard security flawwww.tripwire.com6/19/2015
Unpatched OS X, iOS flaws allow password, token theft from keychain,
'Billions' of records at risk from mobile app data flawwww.cnbc.com6/17/2015
Vulnerability in Samsung Galaxy phones put over 600 million Samsung phone users at riskwww.computerworld.com6/16/2015
Announcing Security Rewards for Androidgoogleonlinesecurity.blogspot.com6/16/2015
Snapchat steps up its security with login verificationnakedsecurity.sophos.com6/11/2015
Bug in iOS Mail app is a dream come true for
Apple working on fix for bug that crashes iPhones with a text messagewww.zdnet.com5/28/2015
Trend Micro Discovers Apache Cordova Vulnerability that Allows One-Click Modification of Android Appsblog.trendmicro.com5/27/2015
2.8 million victims squared up by malicious Minecraft
Even a factory reset in Android phones leaves user data behindwww.computerworld.com5/22/2015
Google, Samsung get closer to giving passwords the finger with FIDO certificationwww.zdnet.com5/22/2015
Get ready for Android M, for "more privacy"www.zdnet.com5/8/2015
Thousands of iOS apps left open to snooping thanks to SSL bugwww.zdnet.com4/27/2015
Google makes mobile websites more app-like with Chrome push notificationswww.computerworld.com4/21/2015
iOS 8.3 fixes dozens of security vulnerabilitieswww.zdnet.com4/9/2015
A MILLION Chrome users' data was sent to ONE dodgy IP
Android Installer Hijacking Bug Used as Lure for Malwareblog.trendmicro.com4/6/2015
Android Installer Hijacking Vulnerability Could Expose Android Users to Malwareresearchcenter.paloaltonetworks.com3/24/2015
FREAK Out on Mobilewww.fireeye.com3/17/2015
“Free” Apps In Chinese App Stores Put Users At Riskblog.trendmicro.com3/16/2015
‘Podec’ Trojan Bypasses CAPTCHA on Android Phoneswww.tripwire.com3/11/2015
This Android update may stop your phone being stolenwww.cnbc.com3/10/2015
‘Gazon’ Malware Spreads Via SMS Using Fake Amazon Gift Card Offerswww.tripwire.com3/3/2015
iOS Masque Attack Revived: Bypassing Prompt for Trust and App URL Scheme Hijackingwww.fireeye.com2/19/2015
Smartphone thefts decline following introduction of "kill switch"www.scmagazine.com2/12/2015
Dating apps pose US corporate security risk, says IBMwww.cnbc.com2/11/2015
Android Malware Poses as Games on Google Play Store, Infects Millions of Userswww.tripwire.com2/4/2015
Outlook for iOS app "breaks" corporate security, developer sayswww.zdnet.com1/30/2015
NFL Mobile App Leaks Unencrypted Credentialsthreatpost.com1/28/2015
Android WiFi-Direct Denial of Servicewww.coresecurity.com1/26/2015
Mobile malware on the rise worldwide, ransomware hits the spotlightwww.zdnet.com1/20/2015
Vulnerability in Verizon My FIOS App Allowed Users to Compromise Others’ Email Accountswww.tripwire.com1/19/2015
Android malware encounters surged in 2014, up by 75 percent, report sayswww.scmagazine.com1/15/2015
Hackers Exploit Android Same Origin Policy Bug to Takeover Facebook Accountswww.tripwire.com12/29/2014
Manufacturer’s Backdoor Found on Popular Chinese Android Smartphonethreatpost.com12/17/2014
New ‘Fakedebuggerd’ Vulnerability Must Be Taken Seriouslywww.tripwire.com12/7/2014
'Most advanced mobile botnet EVER' is coming for your OFFICE
New rules aim to prevent IoT devices from taking down mobile networkswww.computerworld.com10/14/2014
Apple doubles-down on security, shuts out law enforcement from accessing iPhones, iPadswww.zdnet.com9/18/2014
Gartner: 75 percent of mobile apps will fail security tests through end of 2015www.scmagazine.com9/18/2014
Critical Android FakeID Bug Allows Attackers to Impersonate Trusted Appsthreatpost.com7/29/2014
Android bug lets apps make rogue phone callswww.computerworld.com7/7/2014
Android SMS worm punts dodgy downloads... from your
Heartbleed-based BYOD hack pwns insurance giant Aviva's
Google and Microsoft want to kill your phone if it's stolen. Do you feel safer?nakedsecurity.sophos.com6/20/2014
Surprise Android 'KitKat' update fixes nasty OpenSSL
Security holes could give hackers access to iOS, Android deviceswww.computerworld.com6/18/2014
Hacker Hijacks Storage Devices, Mines $620,000 in Dogecoinwww.wired.com6/17/2014
Chrome OS leaks data to Google before switching on a VPN, says
‘Placebo’ Security Apps Booted From Google Play, Amazonthreatpost.com6/5/2014
Spotify Android Application at Issue in Breachthreatpost.com5/27/2014
New iPhone lock screen flaw gives hackers full access to contact list datawww.zdnet.com5/8/2014
iOS 7 reportedly not encrypting email attachmentswww.cnet.com5/5/2014
New iOS malware with a funky name: "Unflod Baby Panda"nakedsecurity.sophos.com4/21/2014
Smarten Up! Everyone Needs to Think About Android Securitysecuritywatch.pcmag.com4/4/2014
BYOD: Why You Better Not Ignore Itsecurityintelligence.com4/1/2014
Beware this big iOS flaw -- and it's not alonenews.cnet.com3/17/2014
New security flaw opens iPhone, iPads to covert keyloggingwww.zdnet.com2/25/2014
Samsung's Galaxy S5 Takes Steps Forward, Though Tiny Onesabcnews.go.com2/24/2014
Apple security update fixes iOS vulnerabilitynews.cnet.com2/21/2014
Android VPN Bypass Vulnerability Affects KitKat As Well As Jelly Beanthreatpost.com1/28/2014
New Android Malware Steals SMS Messages, Intercepts Callsthreatpost.com1/22/2014
Android Vulnerability Enables VPN Bypassthreatpost.com1/20/2014
Starbucks App Stores User Information, Passwords in Clear Textthreatpost.com1/15/2014
Researchers report security flaw in Samsung's Galaxy S4news.cnet.com12/24/2013
How SMB employees feel about their tech resourceswww.zdnet.com12/20/2013
Google puts its own 'find my device' app in the Play Storewww.zdnet.com12/12/2013
Biometric smartphones to become mainstream in 2014, Ericsson sayswww.zdnet.com12/11/2013
Google eyes password-free authentication in Chrome OSnews.cnet.com12/10/2013
iSPY: Apple Stores switch on iBeacon phone sniff spy
Google Nexus phones reportedly susceptible to SMS attacksnews.cnet.com11/29/2013
European Parliament's network hacked; public Wi-Fi shutdownwww.zdnet.com11/28/2013
Authentic8's SILO: The ultimate security solutionwww.zdnet.com11/18/2013
Apple iOS 7.04 Fixes App Store Purchase Flawthreatpost.com11/15/2013
Juniper study: 80% of smartphones still unprotected from malware, attackswww.zdnet.com10/9/2013
iOS 7's Airplane mode 'can be exploited for iPhone account hijack attack'www.zdnet.com10/4/2013
7 enterprise security improvements in iOS 7www.zdnet.com9/30/2013
Apple, Google, Microsoft make progress against phone theftwww.zdnet.com9/27/2013
Apple's advanced fingerprint technology is hacked; should you worry?www.zdnet.com9/23/2013
Apple promises to fix iOS 7 lock screen hacknews.cnet.com9/19/2013
Microsoft puts something hard and sensitive in your
iPhone fingerprint scanner sparks privacy worriesnews.cnet.com9/17/2013
Secure SMS app Wickr finally hits Androidnews.cnet.com9/16/2013
Yahoo's Mayer gives phone passcodes a passnews.cnet.com9/11/2013
Apple Announces iPhone 5s—The Most Forward-Thinking Smartphone in the
If the New iPhone Has Fingerprint Authentication, Can It Be Hacked?www.wired.com9/9/2013
Millions of Android users vulnerable to security threats, say fedswww.zdnet.com8/26/2013
Mobile Threat Monday: Nasty Adware And A Master Key Mysterysecuritywatch.pcmag.com8/26/2013
Hack to School: Beware the open school wi-fiwww.zdnet.com8/19/2013
Google confirms Android flaw that led to Bitcoin theftnews.cnet.com8/14/2013
BYOD Gives Vulnerable Devices Corporate Network Accessthreatpost.com8/9/2013
Windows Phones BLAB passwords to hackers, thanks to weak
Black Hat: Mobile carriers react quickly to major SIM card vulnerabilitywww.scmagazine.com8/2/2013
Black Hat: Mobile carriers react quickly to major SIM card vulnerabilitywww.scmagazine.com8/2/2013
Apple to Fix ‘Fake USB Charger’ Flaw in iOS 7threatpost.com8/1/2013
Don't adapt old IT security policies for BYOD: IBMwww.zdnet.com7/30/2013
Is Your Mobile Device Misbehaving? How to Catch Common Malware Misbehaviorsblogs.mcafee.com7/23/2013
Tumblr Fixes Password-Sniffing Bug on iPad, iPhonethreatpost.com7/18/2013
Tumblr urges password reset after iPhone/iPad security lapsewww.zdnet.com7/17/2013
Third-party app released to fix Bluebox Security Android holewww.zdnet.com7/17/2013
14-month-old tot buys her dad a car on eBaynakedsecurity.sophos.com7/15/2013
Five simple ways to avoid Android malwarewww.zdnet.com6/28/2013
Most Android threats would be blocked if phones ran latest Android version, report sayswww.computerworld.com6/26/2013
Mobile malware grows by 614 percent in last yearnews.cnet.com6/25/2013
BYOD: Many Call It Bring Your Own Malware (BYOM)
The Defense Department Lists Mobile Security as a Top Priorityblogs.mcafee.com6/17/2013
US prosecutors propose kill switch to prevent smartphone theftwww.computerworld.com6/13/2013
'Activation lock' to tighten iOS securitynews.cnet.com6/11/2013
Android trojan attempts to spread via Bluetoothwww.zdnet.com6/10/2013
Ask a hacker: Top four anti-surveillance appswww.zdnet.com6/8/2013
Android malware in pictures - a blow-by-blow account of mobile scarewarenakedsecurity.sophos.com5/31/2013
Growing mobile malware threat swirls (mostly) around Androidwww.computerworld.com5/22/2013
Flurry of products pushing BYOD in Indiawww.zdnet.com5/17/2013
iPhones, iPads cleared for U.S. military use; DOD fortifies cloudwww.zdnet.com5/17/2013
Apple, Samsung, others urged to help thwart mobile phone theftsnews.cnet.com5/13/2013
Smartphone safety lagging, Consumer Reports findsnews.cnet.com5/1/2013
BadNews, fandroids: MILLIONS of Google Play downloads riddled with
ACLU complains to FTC that mobile carriers leave Android phones unsecuredwww.computerworld.com4/17/2013
South Korea tightens online transaction securitywww.zdnet.com4/9/2013
DoD Inspector General Calls Out Army CIO For Poor Mobile Device Securitythreatpost.com4/2/2013
Avaya targets mobile, home-based employees with BYOD security toolswww.zdnet.com3/13/2013
Apple finally fixes App Store flaw by turning on encryptionwww.computerworld.com3/8/2013
Android accounts for most mobile malware, says F-Securewww.zdnet.com3/7/2013
Apple marketing chief jabs Android security on Twitternews.cnet.com3/7/2013
Samsung flaw allows attackers to bypass Android lock screenwww.zdnet.com3/4/2013
Samsung bolsters BYOD management with a Fort Knox approachwww.computerworld.com2/25/2013
HTC Settlement Could Alter Mobile Security and Privacy Landscapethreatpost.com2/25/2013
HTC settles with FTC over software security vulnerabilitiesnews.cnet.com2/22/2013
Citrix releases XenMobile MDM for Apple iOS, Android deviceswww.computerworld.com2/20/2013
10 things you can do to boost your BYOD securitywww.zdnet.com2/20/2013
iOS 6.x hack allows personal data export, free
Banking apps not safe from OS vulnerabilitieswww.zdnet.com2/15/2013
6 threats facing BYODwww.zdnet.com2/14/2013
Malnets to Continue Targeting Mobile Devices in 2013threatpost.com2/12/2013
Should security concerns slow BYOD trend? Probably.www.zdnet.com2/11/2013
Wireless Carriers Leave Millions of Android Phones Vulnerable to Hackerswww.wired.com2/5/2013
Phil Zimmermann: 'We Really, Really Don't Have the Keys'threatpost.com2/5/2013
Indian vendors answering BYOD security needswww.zdnet.com2/4/2013
FTC Endorses New Privacy Guidelines, Do Not Track for Mobile Apps, Devicesthreatpost.com2/4/2013
Snooping on movement can reveal smartphone
Kaspersky Lab adds mobile and system management to its business security offeringwww.computerworld.com1/30/2013
Third Party Android App Store Doling Out Adwarethreatpost.com1/22/2013
Infected Site Spreading SMS Android Malwarethreatpost.com1/22/2013
ESPN's ScoreCenter for iOS sends passwords in clear-text, susceptible to XSS flawwww.zdnet.com1/18/2013
China's Android users warned of giant
Update:This Nevada man doesn't have yourlost cellphonewww.computerworld.com1/15/2013
Happy now? Mobiles, cloud, big data now 'a growing security risk'
51% of UK networks compromised by BYODwww.infosecurity-magazine.com1/7/2013
Samsung rolls out Exynos patch to Galaxy S3 handsetswww.zdnet.com1/4/2013
NYC mayor pins crime rate spike on iPhone, iPad
Mobile threats predicted top concern for 2013www.scmagazine.com12/28/2012
Interview with Kaspersky Chief Malware Expert Alex Gostevthreatpost.com12/24/2012
'Shake to charge', similar crapps foul up Amazon Android
FCC offers security advice to smartphone userswww.computerworld.com12/20/2012
Samsung aims to fix severe Android device vulnerabilitywww.zdnet.com12/20/2012
Android botnet detected on all major mobile networkswww.scmagazine.com12/19/2012
ARM aims to boost mobile security, ecommercewww.zdnet.com12/18/2012
Security flaw found in Samsung handsets, tabletswww.zdnet.com12/17/2012
SMS stealing apps uploaded to Google Play by Carberp banking malware gangwww.computerworld.com12/14/2012
Companies are losing control of their data to the mobile revolutionwww.infosecurity-magazine.com12/12/2012
10 security stories that shaped 2012www.zdnet.com12/10/2012
Low Detection Rates Mar Google Android Application Verification Servicethreatpost.com12/10/2012
Major £30m cyberheist pulled off using MOBILE
How did European bank malware steal $47 million?www.zdnet.com12/7/2012
Debunking RIM's BlackBerry 10 password 'blacklist'; enterprise security still a top prioritywww.zdnet.com12/7/2012
Twitter SMS-Spoofing Bug Allows Attackers to Send Tweets From Users' Accounts, Edit Profilesthreatpost.com12/4/2012
Twitter Resolves SMS Bug (For Some Users)threatpost.com12/4/2012
Instagram vulnerability on iPhone allows for account takeoverwww.computerworld.com12/2/2012
Nearly half of IT shops ignore BYODwww.computerworld.com11/29/2012
If security wants your password: Privacy for travelers with digital deviceswww.zdnet.com11/20/2012
5 Ways Small Businesses Can Improve Mobile Device Securitywww.darkreading.com11/14/2012
Social networking tops enterprise consumerization security concernswww.infosecurity-magazine.com11/8/2012
Companies Need Defenses Against Mobile Malwarewww.darkreading.com11/8/2012
Faced with escalating mobile malware, NIST publishes mobile security guidelineswww.infosecurity-magazine.com11/1/2012
Five Japanese detained for data theftwww.zdnet.com10/31/2012
How Does Mobility Change IT Risk Management?www.darkreading.com10/26/2012
Trend Micro's Q3 threat report: Mobile malware surged from 30K to 175Kwww.zdnet.com10/22/2012
Popular Android apps under security scrutinywww.zdnet.com10/22/2012
Google building malware scanner for Google Play: reportwww.zdnet.com10/15/2012
Pwn2Own lesson: Don't thumb nose at mobile security threatswww.zdnet.com9/20/2012
Over half of Android devices have unpatched vulnerabilities, report sayswww.csoonline.com9/14/2012
Apple UDIDs leaked by Anonymous came from Florida firm, not FBIwww.zdnet.com9/10/2012
SMSZombie wraps self in nudie pics, slips into 500,000 Android
iPhone SMS vulnerable, according to researchernews.cnet.com8/17/2012
Researcher finds serious SMS spoofing flaw on iOSwww.zdnet.com8/17/2012
DOJ: iPhones 'too secure'; A key moment for the enterprise?www.zdnet.com8/13/2012
Shylock malware injects rogue phone numbers in online banking websiteswww.computerworld.com8/8/2012
Two arrested for hacking personal data of 8.7 million phone userswww.zdnet.com7/29/2012
New contacts stealing Android malware spotted in the wildwww.zdnet.com7/20/2012
iPhone Trojan App Sneaks Past Apple Censorswww.informationweek.com7/9/2012
F-Secure chief warns Siri is 'unsafe for business'www.zdnet.com6/14/2012
Apple's iOS 6 to add privacy controls for user contactsnews.cnet.com6/14/2012
Understanding cyberspace is key to defending against digital attackswww.washingtonpost.com6/2/2012
Top Handset Maker Confirms Backdoor in One of Its Modelswww.wired.com5/18/2012
Stolen NASA laptop had Space Station control
Cops cuff premium-rate SMS Android malware
Google Wallet disables prepaid card use following latest hacksnews.cnet.com2/13/2012
Lost in BYOD's uncharted legal waterswww.infoworld.com1/6/2012
Lax security exposes voice mail to hacking, study
Google pulls 22 more malicious Android apps from Marketwww.computerworld.com12/12/2011
Joint Commission: Text Messages Should Not Be Used in Patient Orderswww.ihealthbeat.org11/21/2011
Google will ignore your Wi-Fi router ... if you rename
White Papers
Cisco Connected World—International Mobile Security: Survey Research Highlights and Considerations for Enterprise
McAfee Threats Report: Second Quarter 2013www.mcafee.com8/21/2013
McAfee Threats Report: First Quarter 2013www.mcafee.com6/3/2013
F-Secure Mobile Threat Report Q4 2012www.f-secure.com3/7/2013
Blue Coat Systems 2013 Mobile Malware Reportwww.bluecoat.com2/12/2013
Mobile Privacy Disclosureswww.ftc.gov2/4/2013
Department of Defense Mobile Device Strategywww.defense.gov6/8/2012
2012 State of Mobility
iOS Hardening
The Lowdown on Laptops: Data Security for the Road Warriorbusiness.ftc.gov7/1/2007
NIST SP 800-28 Version 2 Guidelines on Active Content and Mobile CodeNIST3/1/2008
NIST 800-79-2, Guidelines for the Authorization of Personal Identity Verification Card Issuers (PCI) and Derived PIV Credential Issuers (DPCI)NIST7/30/2015
NIST SP 800-101 Rev.1 Guidelines on Mobile Device ForensicsNIST5/28/2014
NIST Guide to Bluetooth SecurityNIST5/8/2017
NIST SP 800-124 r1 Guidelines for Managing and Securing Mobile Devices in the EnterpriseNIST6/24/2013
NIST SP 800-153 Guidelines for Securing Wireless Local Area Networks (WLANs)NIST2/21/2012
NIST SP 800-163 Vetting the Security of Mobile ApplicationsNIST1/26/2015
NIST SP 800-164 Draft Guidelines on Hardware- Rooted Security in Mobile Devices (Draft)NIST10/31/2012
NIST Cybersecurity Practice Guide SP 1800-1, Securing Electronic Health Records on Mobile Devices (Draft)NIST7/28/2015