Mobile Security

Mobile Devices Eyes North America Telematics Retrofit Market.

As major car OEMs and telcos compete to offer the latest EV and autonomous vehicle connectivity solutions, Mobile Devices Ingenierie, a leading provider of Edge Computing Platforms for all Telematics segments, today highlighted the North American retrofit opportunity. Aaron Solomon, Mobile Devices founder and CEO highlighted the current market opportunity: “There are over 280 million existing car owners in North America today compared to an estimated 20 million cars in the US with connectivity capability....

Read more
MobileIron Announces Zero Trust Platform Making The World’s Most Ubiquitous Product – The Mobile Device – Your ID And Secure Access To The Enterprise.

MobileIron (NASDAQ:MOBL) introduces the industry’s first mobile-centric, zero trust security platform. MobileIron's mobile-centric strategy allows for continuous enforcement and protection of data, both on the device and on the network, with comprehensive correlation between the critical signals for zero trust: user, device, apps, networks, and threats. This makes the world’s most ubiquitous product – the mobile device – your ID and secure access to the enterprise. This platform goes beyond identity management and gateway approaches...

Read more
Digital Identity App Yoti Announces Partnership With Biometric Software Company FaceTec.

Yoti, the digital identity app with over 3.7 million downloads across the UK, US and India, announces a new partnership with FaceTec, the world leader in biometric face solutions. Yoti has introduced FaceTec’s ZoOm 3D Authentication with TrueLiveness™ to its products for increased security. Initially, Yoti will integrate ZoOm into the online browser version of its age estimation technology Yoti Age Scan, a secure age-checking service that accurately estimates a person’s age by looking at...

Read more
I Miss The 000000ld Kanye: West Tops Dashlane’s List of 2018’s “Worst Password Offenders”.

Dashlane today announced its third annual list of the “Worst Password Offenders.” The list highlights the high-profile individuals and organizations that had the most significant password-related blunders in 2018. “Passwords are the first line of defense against cyberattacks,” said Emmanuel Schalit, CEO of Dashlane. “Weak passwords, reused passwords, and poor organizational password management can easily put sensitive information as risk.” Dashlane found that the average internet user has over 200 digital accounts that require passwords,...

Read more
Swivel Secure Launches Updated AuthControl Mobile Version 5.

Multi-factor authentication provider, Swivel Secure, has announced the launch of its new AuthControl Mobile application, Version 5. The new update further enhances security and increased deployment agility for its users. The application has been totally rewritten to provide its users with a better performing core functionality in a even more secure system. The new version of AuthControl Mobile V5 supports several languages according to the configuration of the device, enhancing the user experience and comfort...

Read more

A10 Networks, a leading provider of intelligent and automated cybersecurity solutions, today outlined its strategy, solutions, and roadmap to help mobile carriers future-proof their networks for the coming wave of 5G and the demanding new applications, including enhanced Mobile Broadband (eMBB), Ultra-Reliable Low-Latency Communications (URLLC), and Massive Machine Type Communications (MMTC), it will enable. A10, a leading solutions provider to mobile carriers, has proven production and pilot 5G deployments with tier-1 carriers worldwide, and is...

Read more

Malicious and fake versions of Fortnite have sprung up all over YouTube after the game was announced to launch on Android platforms. Security researchers at Malwarebytes made the discovery whereby various tutorial videos were discovered within sponsored adverts. Even though the adverts and the Epic Games (the game creators) logo all seemed legitimate, the malicious links are in fact stealing content from the iOS app once users begin the downloading process. This requires the user to complete what...

Read more

With mobile devices set to become the primary way to verify customer identity, Callcredit launches new suite of products to provide positive associations between identity and key digital attributes of email address and/or telephone number   Research launched today by Callcredit Information Group, reveals that whilst 73% of fraud professionals think mobile devices will be the key facilitator of identification in the future, over half (60%) feel that they will present the biggest single point...

Read more

The continued proliferation of mobile applications can only be maintained if security considerations make up a key part of the design and implementation process. This is according to DOGFI.SH Mobile who suggests that as the mobile app market continues to mature, any flaws in an app’s security architecture will become clearer, with users becoming increasingly intolerant to these weaknesses. Research from McAfee has revealed that mobile malware has grown by 79 per cent in the...

Read more

The recent Tesco Bank hack has left the retail banking world reeling, searching for answers and more effective ways to secure networks against future attacks. It has been revealed weaknesses in the bank’s mobile applications left the door open for cybercriminals to brute force their way in and take more than £2.5 million of customers’ money. Worse still, the bank had been warned by several security experts of this weakness prior to the attack. How...

Read more
Page 1 of 2 1 2