Honeywell’s handheld computers are advertised as devices that combine the advantages provided by consumer PDAs with high-end industrial mobile computers. These rugged devices run Android or Windows operating systems and they provide a wide range of useful functions and connectivity features, including Wi-Fi, Bluetooth and compatibility with Cisco products. The devices are used worldwide in…

ThreatMetrix released new cybercrime insights from the first half of 2018, revealing a sharp rise in fraud attack levels on mobile transactions. As consumer behavior increasingly embraces mobile for virtually all online goods and services, fraudsters are starting to close the gap on this channel. Mobile becomes the go-to digital channel The rise of mobile…

The twin developments come as Facebook is under intense scrutiny over privacy following the Cambridge Analytica scandal earlier this year. Allegations that the political consultancy used personal information harvested from 87 million Facebook accounts have dented Facebook’s reputation. Since the scandal broke, Facebook has investigated thousands of apps and suspended more than 400 of them…

Many people think that Android devices do not need an antivirus solution at all, but countless kinds of malware exist for the mobile OS, some on official stores such as Google Play. In other words, antivirus software could actually come in very handy. So, which one should you choose? Which mobile antivirus? Of course, we…

Google this week released its July 2018 set of Android patches to address tens of vulnerabilities in the mobile operating system, including several rated as Critical. The Internet giant addressed 11 vulnerabilities as part of the 2018-07-01 security patch level, including three rated Critical and 8 High risk bugs. The issues impact framework, media framework,…

Newly devised attacks on the Long Term Evolution (LTE) high-speed wireless standard break the confidentiality and privacy of communication, team of researchers claim. In a newly published paper (PDF), researchers from Ruhr-University Bochum and New York University Abu Dhabi present a set of attacks against LTE’s data link layer (layer two) protocols, which could be…

As the workforce becomes increasingly mobile, organizations must adapt their security strategies to account for the enlarged threat surface. While mobility undeniably helps organizations boost productivity, it also creates considerable weaknesses in the IT environment. How can companies strike a balance between giving employees the 24/7 access they need to perform their jobs and protecting…

Experience is a valuable teacher, especially when you’re able to learn lessons from others who have taken similar journeys. That’s why we recently polled some of our most successful mobile security customers. They had valuable stories to share about the process they underwent evaluating and implementing mobile security solutions. We wanted to know the backstory:…