Data Privacy Regulations: Ensuring Mobile Data Protection in Light of Increasing Regulations

Organizations in every industry, from banking to retail, healthcare and more, are required to apply mobile data protection rules set by governments that impose massive fines in cases of noncompliance. Until the early 2000s, it was simpler to control data flows because information was mostly accessed from computers. Since then, companies have digitized their frameworks […]

The post Data Privacy Regulations: Ensuring Mobile Data Protection in Light of Increasing Regulations appeared first on Security Intelligence.

Continue reading Data Privacy Regulations: Ensuring Mobile Data Protection in Light of Increasing Regulations

1M Downloads Later, Google Pulls Phony WhatsApp From Google Play

An adware-laden phony WhatsApp download has been removed from Google Play and the developer’s account suspended, but not before it was downloaded one million times. Continue reading 1M Downloads Later, Google Pulls Phony WhatsApp From Google Play

iOS 11 in the Enterprise: Get Your iPads Ready

The upcoming release of Apple iOS 11 will bring significant changes to the enterprise in the form of enhanced customization, discoverability and more.

The post iOS 11 in the Enterprise: Get Your iPads Ready appeared first on Security Intelligence.

Continue reading iOS 11 in the Enterprise: Get Your iPads Ready

O Me, O My! Android O and Its Impact on the Enterprise

Google’s Android O version 8.0 features a safe browsing API and other functions to improve mobile application security in the enterprise.

The post O Me, O My! Android O and Its Impact on the Enterprise appeared first on Security Intelligence.

Continue reading O Me, O My! Android O and Its Impact on the Enterprise

Ultrasonic Beacons Are Tracking Your Every Movement

More than 200 Android mobile applications listen surreptitiously for ultrasonic beacons embedded in audio that are used to track users and serve them with targeted advertising. Continue reading Ultrasonic Beacons Are Tracking Your Every Movement

Who Is Responsible for IoT Security?

As the Internet of Things grows and mobile devices become increasingly connected, the security community must define who is responsible for IoT security.

The post Who Is Responsible for IoT Security? appeared first on Security Intelligence.

Continue reading Who Is Responsible for IoT Security?

Mobile Mania! IBM MaaS360 Unveils New Benchmarks and Security Index

The IBM MaaS360 team released its Mobile Metrics report to kick off Mobile World Congress and illustrate the state of the ever-shifting mobile landscape.

The post Mobile Mania! IBM MaaS360 Unveils New Benchmarks and Security Index appeared first on Security Intelligence.

Continue reading Mobile Mania! IBM MaaS360 Unveils New Benchmarks and Security Index