Commentary
Twitter's Two-Factor Authentication: 5 Reasons To AvoidTwo-step verification system has no provision for backup access or lost phones, doesn't address public username problem. Android Smartphone Sellers Should Patch, Refund Or Perish
FTC should crack down on wireless carriers and smartphone manufacturers that put their customers at risk by failing to update Android devices. Security Tools Show Many Dots, Few Patterns
Today's security software wastes valuable time by delivering data dumps, rather than focusing on trends. But you can create your own visualizations. Apple Suggests iMessage As SMS Bug Work-Around
Rather than fixing a security problem discovered last week, Apple tells users concerned with SMS spoofing to use its iMessage product instead of... What Sophos Brings To MDM Table
Security vendors are rushing to fill gaping holes in IT's ability to manage mobile devices. But if you expect perfection, you'll wait too long. Apple Security Talk Suggests iOS Limits
Apple rightly earned plaudits for delivering a presentation on iOS security at Black Hat. But what was left unsaid may have revealed new details...
By The Numbers
What Keeps Us Awake
We polled 1,084 security pros about their mobile security nightmares:
Note: Three responses allowed
News
Smartphone Makers Asked To Fight 'Apple-Picking'Mobile device theft is being called an epidemic. Apple tweaks iOS 7; device makers and law enforcement also team on anti-theft technology. Android Trojan Looks, Acts Like Windows Malware
Android Trojan "Odad.a" rivals Windows malware in the harm it can do to mobile device users, say experts. Appthority Portal Helps Assess Mobile Risk
Appthority Portal gives customers greater granularity in determining and responding to mobile risk factors.
More Stories:
InformationWeek Reports
Mobility's Next Challenge: 8 Steps to a Secure Environment
Taking your company's mobile capabilities to the next level--whether on personally or company-owned devices-requires a lifecycle management plan that encompasses application security, development, distribution, support and enhancement. We show you how to get there and provide insight into five mobile application development options.
Buyer's Guide: Mobile Device Management
Want the lowdown on nine top MDM products? Our InformationWeek Buyer's Guide is your one-stop guide for choosing an MDM system that match your requirements. ZIP file includes: Detailed comparison charts on security, administration, and platform and reporting features; our full questionnaire; and responses from Absolute Software, AirWatch, Fiberlink Communications, JAMF Software, MobileIron, Odyssey Software, Symantec, Tangoe, and Zenprise.
Dark Side of Mobile Apps
Companies are rushing headlong to develop applications for Android, Apple and BlackBerry devices. But IT must maintain its secure development lifecycle process or risk a black eye.
Reducing Mobile Device Risks to Enterprise Data
Innovative IT shops are turning the mobile device management challenge into a business opportunity--and showing that we can help people be more connected and collaborative, regardless of location. We offer a framework of four possible strategies to secure the mobile environment.