Mobile

Fingerprint Login Should Be a Secure Defense for Our Data, But Most of Us Don't Use It Properly

Most users remain unaware of its initial purpose.

Senator Calls on State Dept. to Investigate Appointees’ Use of Personal Devices for Work

Impeachment hearing revelations highlight a larger security problem, Democrat says.

Congress Reaches Deal to Fight Robocalls

“It’s time to put Americans back in charge of their phones,” lawmakers said.

Spy Agencies Stopped Collecting GPS, Phone Location Data Last Year

The decision came in the wake of a Supreme Court decision restricting law enforcement’s use of such information.

DHS Cyber Monitoring Program Is Shedding Light on Agencies’ Shadow IT

Before using tools provided under the Continuous Diagnostics and Mitigation program, agencies only knew about four of every seven devices that connected to their networks, according to program manager Kevin Cox.

Senator Urges Cybersecurity Review of Mobile Voting App

West Virginia and local governments in Colorado, Utah and Oregon have all piloted mobile voting applications developed by Voatz.

China Said It’s Developing 6G. What Does That Mean?

While most mobile users operate on 4G, the country announced two working groups focused on advancing 6G.

Outcomes, Not Programs, Will Define DOD’s Cybersecurity Record

The Defense Department is changing how it defines and defends its networks.

How to Deal with Smartphone Stress

Ongoing stress—like constant alerts and notifications—can lead to health problems and shorter lives.

Featured eBooks

Vets Can Now See VA, Private Sector Health Data in iPhone App

Apple’s Health app now integrates with Veterans Affairs’ patient data API, giving veterans access to their medical information on their phones.

A Plan to Reduce Bench Warrants—By Text Message

After success in one county, Minnesota is rolling out a statewide program that sends reminders to defendants about their court appearances.

Typing Speed on Mobile is Catching Up to Keyboards

Typing speed on mobile devices is catching up to that of physical keyboards, a study of more than 37,000 users shows.

The Hidden Dangers in Your Phone Number

Using your phone as an authenticator can be a problem.

How Federal Agencies Can Be More Proactive About Cloud Security

For starters, agencies need a deep understanding of user behavior.

Cybersecurity and the Road Ahead

Federal agencies are focused on locking down access to their systems.

Treasury IG Finds ‘Significant Vulnerabilities’ in IRS’ BYOD Program

The IRS’ bring-your-own-device program could increase the risk of data leakage, according to the Treasury Inspector General.