By popular demand, the Chet Chat has gone back to a weekly format, so your favourite security podcast will now be appearing twice as frequently!
Listen to Chet and Duck in the latest episode...
Remote wiping? Encryption? Secure passcode? Here are 10 tips to ensure you keep your smartphone just as secure as your PC.
The US Department of Defense has approved the use of Samsung phones running "Knox," a hardened version of Android.
A recent report by the US Inspector General revealed staggering flaws in the US military's management of mobile devices, and a severe lack of basic IT security protection in place for such devices.
Your workforce wants anytime, anyplace access to applications, but you have a network to protect. Here are a few ideas to make life harder for the bad guys, while making you the good guy.
AT&T, T-Mobile, Verizon and Sprint have flipped the switch on databases that will track stolen cellphones and block them from being used on the major carriers' networks. Now, just make sure you've got your phone's ID number written down somewhere, and try not to go into a cellphone coma on the subway.
Do you always turn WiFi off on your smartphone before leaving the house or work? You might think there's no harm in having WiFi turned on but not connected to a network, but that's not necessarily the case.
It doesn't quite stretch to smartphones yet, but the US Federal Aviation Administration has announced they're going to take a "fresh look" at using personal devices such as e-readers and tablets during takeoff on planes.
If you work in IT, you’ve probably been here already. Someone important is proudly clutching a shiny new toy and asking you that vague, difficult question: "Can I use this?".
So how do you respond?
The United States is preparing a modified version of Google's Android operating system to allow soldiers to use smartphones.
Whether you approach the holiday travel season with dread or excitement chances are you will be carrying one or more mobile devices and looking for those last minute travel bargains. Naked Security's Lisa Vaas provides her advice on what to watch out for this year.
Verizon and Google are sparring over who will control mobile phone payment systems, but consumers seem to be left without choice in the United States.
Academic researchers have demonstrated flaws in the Android permissions system that could allow rogue applications to gain access to SMS messages, GPS or even record audio from affected devices.
Many of us have two phones: one for work AND one for personal stuff. Would it not be better just to have one? Tell us what you think and win a very sexy Naked Security t-shirt in our great smartphone debate.