Mobile Device Authentication – A Look at Behavior-based Authentication

finjanmobileBlog, Mobile Security

Behavior-based Authentication

Though they’re growing to become as much a part of everyday life as the clothes we put on every morning, mobile devices are still looked upon as a useful appendage, rather than a vulnerable repository for our priceless personal data, financial information, photographs, and contacts. A 2014 study in the Symposium on Usable Privacy and Security (SOUPS) revealed that 57% … Read More

Apps are Creating Mobile Security Vulnerabilities for IoT – How Bad is It?

finjanmobileBlog, Mobile Security

Mobile Security Vulnerabilities for IoT

In the corporate environment of today, Bring Your Own Device (BYOD) may extend beyond workers using their personal tablets and smartphones, to wearable devices like FitBits or Internet of Things (IoT)-connected badges and performance monitors. On the domestic or public scene, mobile devices are increasingly being supplemented by IoT tagged or sensor-laden goods, appliances, and infrastructure components. Office managers, home … Read More

Protecting Sensitive Data on Your Mobile Device

finjanmobileBlog, Mobile Security

Protecting Sensitive Data on Your Mobile Device

A 2015 survey of 2,000 office workers revealed that 73% of those polled had downloaded personal apps to tablets issued by their employers, while over 50% used their personal smartphones and devices to conduct company business. With the lines now blurred between personal and corporate, the data stored and transmitted on mobile devices is often a mix of personally identifiable … Read More

Human Behavior – the Achilles Heel in Mobile Security

finjanmobileBlog, Mobile Security

Human Behavior - the Achilles Heel in Mobile Security

The continued success of email phishing attempts and social engineering tactics, and the growing efficiency of the emerging breeds of mobile malware all attest to a fact that security professionals have been moaning about for years: Human beings (in this case, mobile device users) are the single most effective tool that cyber-criminals have in compromising security. In classical Greek mythology, … Read More

Mobile Device Privacy and Security – Challenges and Recommendations

finjanmobileBlog, Mobile Security

mobile device privacy

With some analysts predicting that by 2018, 25% of corporate data will pass directly between mobile devices and the cloud (avoiding network security perimeters) – and with an alarming 35% of workers in a Bank of America study admitting that their first thought of the day is to their smartphones, rather than their partners – it’s obvious that mobile technologies … Read More

Mobile Device Security – Smartphones are Becoming the New Target of Hackers

finjanmobileBlog, Mobile Security

mobile device security

For some years, cyber-criminals have been exploiting desktop operating system and software vulnerabilities, leveraging unpatched web browsers with vulnerable add-ons and using human psychology and social engineering tactics to ensnare unsuspecting users into revealing vital information, giving the perpetrators access to systems and networks, or simply acting as a conduit for malware. Now though, the focus for cyber-threat activity is … Read More