The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Outsourcing Cybersecurity: A Decision Maker's Guide
Jun 29, 2022
Using Threat Modeling to Improve Enterprise Cyber Defenses
Jun 28, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Outsourcing Cybersecurity: A Decision Maker's Guide
Jun 29, 2022
Using Threat Modeling to Improve Enterprise Cyber Defenses
Jun 28, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Outsourcing Cybersecurity: A Decision Maker's Guide
Jun 29, 2022
Using Threat Modeling to Improve Enterprise Cyber Defenses
Jun 28, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
HOW DATA BREACHES HAPPEN & WHAT TO DO WHEN THEY HAPPEN TO YOU | June 23 Virtual Event | <Get Your Pass>
Previous
Next
Mobile
Breaking news, news analysis, and expert commentary on cyber threats to mobile devices and the tools & technologies to protect them.
Understanding Private 5G LANs in the Enterprise
As the technology matures and costs begin to drop, 5G LAN looks more like a realistic replacement for corporate Wi-Fi networks.
March 29, 2022
As the technology matures and costs begin to drop, 5G LAN looks more like a realistic replacement for corporate Wi-Fi networks.
by Seth Colaner, Freelance Writer
March 29, 2022
12 min read
Article
Private Equity Firm Led by Mnuchin Acquires Mobile Security Vendor Zimperium
Liberty Strategic Capital to pay $525 million for mobile security vendor.
March 29, 2022
Liberty Strategic Capital to pay $525 million for mobile security vendor.
by Dark Reading Staff, Dark Reading
March 29, 2022
1 min read
Article
Name That Toon: Sleep Like a Baby
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
March 21, 2022
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
March 21, 2022
1 min read
Article
Samsung Source Code Compromised in Hack
Mobile vendor confirms that some source code used with its Galaxy devices was breached.
March 07, 2022
Mobile vendor confirms that some source code used with its Galaxy devices was breached.
by Dark Reading Staff, Dark Reading
March 07, 2022
1 min read
Article
How to Get One Step Ahead of Mobile Attacks
The advent of so-called "dropper" apps, which deliver and install malware that can also be later updated, is an emerging threat vector for mobile users.
March 03, 2022
The advent of so-called "dropper" apps, which deliver and install malware that can also be later updated, is an emerging threat vector for mobile users.
by Ralitsa Miteva, Manager of Digital Identity and Mobile Security, OneSpan
March 03, 2022
5 min read
Article
7 Ways to Secure Collaboration Tools in Your Organization
The push to embrace Slack, Teams, and Zoom at work comes with new security risks for organizations.
March 02, 2022
The push to embrace Slack, Teams, and Zoom at work comes with new security risks for organizations.
by Steve Zurier, Contributing Writer
March 02, 2022
1 min read
Article
Ukrainian Troops Targeted in Phishing Attacks by Suspected Belarusian APT
Ukraine's Computer Emergency Response Team calls out UNIC1151 nation-state hacking group out of Belarus as behind the attacks.
February 25, 2022
Ukraine's Computer Emergency Response Team calls out UNIC1151 nation-state hacking group out of Belarus as behind the attacks.
by Dark Reading Staff, Dark Reading
February 25, 2022
1 min read
Article
Kryptowire Receives Funding from USVP and Crosslink Capital
New funding will be used to accelerate the adoption of intrusion-free mobile security into targeted verticals.
February 16, 2022
New funding will be used to accelerate the adoption of intrusion-free mobile security into targeted verticals.
February 16, 2022
4 min read
Article
Apple Releases Security Update for Webkit Flaw
A Webkit use-after-free vulnerability in iOS, iPadOS, Monterey, and Safari may already have been exploited, Apple said in a security advisory issued today.
February 10, 2022
A Webkit use-after-free vulnerability in iOS, iPadOS, Monterey, and Safari may already have been exploited, Apple said in a security advisory issued today.
by Dark Reading Staff, Dark Reading
February 10, 2022
1 min read
Article
Olympic Athletes Advised by FBI to Bring 'Burner' Phones to Beijing
No specific threats against the Olympics, according to the FBI, but instead it's about vigilance against potential ones.
February 02, 2022
No specific threats against the Olympics, according to the FBI, but instead it's about vigilance against potential ones.
by Dark Reading Staff, Dark Reading
February 02, 2022
1 min read
Article
OMB Issues Zero-Trust Strategy for Federal Agencies
Federal officials tout the strategy as a more proactive approach to securing government networks.
January 26, 2022
Federal officials tout the strategy as a more proactive approach to securing government networks.
by Dark Reading Staff, Dark Reading
January 26, 2022
1 min read
Article
Name That Toon: Nowhere to Hide
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
January 18, 2022
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
January 18, 2022
1 min read
Article
Fighting Back Against Pegasus, Other Advanced Mobile Malware
Detecting infection traces from Pegasus and other APTs can be tricky, complicated by iOS and Android security features.
January 13, 2022
Detecting infection traces from Pegasus and other APTs can be tricky, complicated by iOS and Android security features.
by Costin Raiu, Global Director, Kaspersky GReAT
January 13, 2022
6 min read
Article
How to Protect Your Phone from Pegasus and Other APTs
The good news is that you can take steps to avoid advanced persistent threats. The bad news is that it might cost you iMessage. And FaceTime.
January 13, 2022
The good news is that you can take steps to avoid advanced persistent threats. The bad news is that it might cost you iMessage. And FaceTime.
by Costin Raiu, Global Director, Kaspersky GReAT
January 13, 2022
9 min read
Article
Mobile Application Security: 2021's Breaches
Many of last year's largest app breaches could have been prevented with testing, training, and the will to take app security seriously.
January 04, 2022
Many of last year's largest app breaches could have been prevented with testing, training, and the will to take app security seriously.
by Brian Reed, Chief Mobility Officer, NowSecure
January 04, 2022
5 min read
Article