• How mobile payments will evolve

    George Wallner says, "There's not anything wrong with [today's] technology, it's just not supported." (From the ATM & Mobile Executive Summit …
  • How secure are cards on mobile phones?

    "Attacking a phone — especially if it has a piece of hardware to securely store the card data — is not a very rewarding process for a hacker." (George Wallner at the ATM & …
  • U.S. Treasury Dept. concerned about mobile payments in Kenya

    Kenya is a terrible example of regulation supervision, says Emery Kobor, Deputy Director of Strategic Planning for the U.S. Treasury's Office of Terrorist Financing and Financial Crimes. " …
  • The challenge of Android mobile security

    "Literally as soon as handset manufacturers sell a phone, they no longer care about that phone because they're already moving on to the next version," says Dmitri Alperovitch, co …
  • How a mobile OS was exploited

    CrowdStrike's CTO tells how his team exploited a phone using tools and techniques currently available "in the wild." The phone's owner felt personally vulnerable because much of his …
  • Follow us on Twitter
  • Follow us on Linked In
  • Follow us on Facebook
  • Follow us on Google+
  • Follow site updates with RSS
  • Subscribe to our newsletter
Showing (43 - 63) of 279