Welcome!

Virtualization Authors: Yeshim Deniz, Liz McMillan, PR.com Newswire, Roger Strukhoff, David Smith

Blog Feed Post

Mobile Cyber Security News Weekly – Week of March 30, 2014

Welcome to the Mobile Cyber Security News Weekly, our newest online newsletter. Mobile Cyber Security will focus on the most interesting news, articles and links related to mobile and cyber security, mobile malware, mobile application management, cyber warfare (and more!) that I run across each week.  I am specifically targeting market trend information.

Also read Enterprise Mobility Asia News Weekly
Also read Field Mobility News Weekly
Also read M2M News Weekly
Also read Mobile Commerce News Weekly
Also read Mobile Health News Weekly
Also read Mobility News Weekly

Looking for an enterprise mobility solution?  Read the Mobile Solution Directory Here!

According to security firm MacAfee, malware targeting mobile devices is becoming more common at an alarming rate. The firm notes the presence of malware targeting the Android platform specifically has tripled between 2012 and 2013, with an estimated 3.7 million malware applications having been identified at this time. Read Original Content

According to William Duckworth, associate professor of statistics, data science, and analytics at Creighton University, adding anti-theft technology in modern smartphones such as remote "kill-switches"—could save device owners up to $2.6 billion a year. Read Original Content

The Pentagon plans to triple its cyber security personal over the next several years to bolster U.S. national security, according to Defense Secretary Chuck Hagel. Read Original Content

The True Cost of Mobility - Companies are under tremendous pressure to develop and deploy mobile apps for their business systems, yet the traditional approach to mobile app development typically costs $250K+ and takes 6+ months for a single app. Today IT professionals are exploring platforms that radically reduce costs and time-to-market for their mobile initiatives, especially around complex applications such as SAP, Oracle, or custom applications. Download the whitepaper - https://www.capriza.com/resources/whitepapers/?resource=true-cost-of-enterprise-mobility&adgroup=MES

Palo Alto Networks Inc, which makes firewalls to protect companies from cyber attacks, said it would buy an Israeli security firm, Cyvera, for about $200 million in a move that some analysts expect will crimp profits over the next few years. Read Original Content

Developers of two popular smartphone apps—Fandango and Credit Karma—have been caught transmitting passwords, social security numbers, birth dates, and other highly sensitive user data over the Internet without properly encrypting it first, officials with the Federal Trade Commission said. Read Original Content

A security intelligence blog, Trend Micro, reported it found several apps on Google Play that were using smartphones to mine for digital currency such as Bitcoin, Dogecoin and Litecoin. Read Original Content

Qihu's 360 Mobile Security app is the crown-bearer in AV-Test's September 2013 report, with its near-perfect 99 percent detection rate, which is the highest of any of the security apps that were tested. Read Original Content

Asia Pacific enterprises and consumers are predicted to spend some $240 million collectively in dealing with computer system issues caused by malware and pirated software, a study by the National University of Singapore and the International Data Corporation said. Read Original Content

Malware delivered through advertisements, known as malvertising, leaves mobile users vulnerable to security breaches and has now overtaken pornography as the biggest threat to phone security. Read Original Content

Fifty-one percent of organizations have an enterprise-wide mobility strategy in place with clearly defined initiatives, while 49 percent do not, finds an Illuminas survey commissioned by Cisco. The survey polled 400 mid-market and enterprise IT decision makers. Read Original Content

Recent Articles by Kevin Benedict

MBaaS, Cloud Computing and Architectures for Enterprise Mobility - What Your Mother Never Told You
The Evolution of Mobility - B2B B2C B2I
Digital Transformation Expert Interview: Author Paul Roehrig
Digital Transformation Expert Interview: Author Ben Pring on Code Halos
IoT and M2M Cloud Controlled Programmable Hardware
Top 10 Mobile Expert Interviews from Mobile World Congress 2014

Webinars of Note (Recorded)

BYOD Security Battle: No Data at Rest vs. Containers
Cloud Middleware: The Key to Scalable Enterprise Mobility
Lean Manufacturing and Mobile Tech: On-Site Opportunities
Rapidly extend any enterprise application to mobile devices without coding, APIs, or integration.
Retail and Mobile Tech: In-Store Opportunities
Top 5 Mobile Apps for Sales Success

Whitepapers of Note

Don't Get SMACked - How Social, Mobile, Analytics and Cloud are Reshaping the Enterprise
Making BYOD Work for Your Organization
Managing BYOD and Legacy Systems
The Secret to Enterprise Mobile Application Adoption
Secure BYOD Apps in a Mobile World
Solving The Mobile Developer Scarcity Problem
The True Cost of Mobility

*************************************************************
Kevin Benedict
Senior Analyst, Digital Transformation Cognizant
View my profile on LinkedIn
Learn about mobile strategies at MobileEnterpriseStrategies.com
Follow me on Twitter @krbenedict
Join the Linkedin Group Strategic Enterprise Mobility
Join the Google+ Community Mobile Enterprise Strategies

***Full Disclosure: These are my personal opinions. No company is silly enough to claim them. I am a mobility and digital transformation analyst, consultant and writer. I work with and have worked with many of the companies mentioned in my articles.

Read the original blog entry...

More Stories By Kevin Benedict

Kevin Benedict is the Senior Analyst for Digital Transformation at Cognizant, a writer, speaker and SAP Mentor Alumnus. Follow him on Twitter @krbenedict. He is a popular speaker around the world on the topic of digital transformation and enterprise mobility. He maintains a busy schedule researching, writing and speaking at events in North America, Asia and Europe. He has over 25 years of experience working in the enterprise IT solutions industry.