<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title><![CDATA[ Mobile RSS Feed]]></title>
        <link>https://www.cshub.com/rss/categories/mobile</link>
        <description><![CDATA[ Today, many organizations also oversee device fleets. Endpoints are growing in the enterprise and many security concerns carry over to mobile phones. Cyber Security Hub offers insight on trends in this space. ]]></description>
        <language>en</language>
        <pubDate>Fri, 22 May 2026 16:55:14 +0000</pubDate>
        <atom:link href="https://www.cshub.com/rss/categories/mobile" rel="self" type="application/rss+xml"/>
                    <item>
                <title><![CDATA[Cyber security risks lurk in popular messaging apps]]></title>
                <link>https://www.cshub.com/mobile/news/cyber-security-risks-lurk-in-popular-messaging-apps?utm_medium=RSS</link>
                <description><![CDATA[ Security incidents are being triggered by employees using messaging apps in business environments ]]></description>
                <author><![CDATA[ michael.hill@iqpc.com (Michael Hill) ]]></author>
                <guid>https://www.cshub.com/mobile/news/cyber-security-risks-lurk-in-popular-messaging-apps?utm_medium=RSS</guid>
                <pubDate>Wed, 06 Dec 2023 14:01:02 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[IOTW: Twilio suffers data breach following phishing attack]]></title>
                <link>https://www.cshub.com/attacks/news/iotw-twilio-suffers-data-breach-following-phishing-attack?utm_medium=RSS</link>
                <description><![CDATA[ Hackers directly targeted Twilio employees with a phishing attack to gain unauthorized access to employee data ]]></description>
                <author><![CDATA[ olivia.powell@iqpc.co.uk (Olivia Powell) ]]></author>
                <guid>https://www.cshub.com/attacks/news/iotw-twilio-suffers-data-breach-following-phishing-attack?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:18:01 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Your device’s safety in someone else’s hands: root and jailbreak]]></title>
                <link>https://www.cshub.com/mobile/articles/your-devices-safety-in-someone-elses-hands-root-and-jailbreak?utm_medium=RSS</link>
                <description><![CDATA[ Rooting and jailbreaking are used to circumnavigate limitations on Android and iOS system but these strategies can have serious affects on a device's security ]]></description>
                <author><![CDATA[ pawelbulat@comarch.com (Paweł Bułat) ]]></author>
                <guid>https://www.cshub.com/mobile/articles/your-devices-safety-in-someone-elses-hands-root-and-jailbreak?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:18:12 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Security Standards For 5G]]></title>
                <link>https://www.cshub.com/mobile/articles/security-standards-for-5g?utm_medium=RSS</link>
                <description><![CDATA[ Gartner predicts that the 5G enterprise IoT endpoint installed base will more than triple between 2020 and 2021, from 3.5 million units in 2020 to 11.4 million units in 2021. By 2023, the enterprise 5... ]]></description>
                <author><![CDATA[  (Esther Shein) ]]></author>
                <guid>https://www.cshub.com/mobile/articles/security-standards-for-5g?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:18:12 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[RSAC2020: IoT Is Officially Part Of Enterprise Mobility]]></title>
                <link>https://www.cshub.com/mobile/articles/rsac2020-iot-is-officially-part-of-enterprise-mobility?utm_medium=RSS</link>
                <description><![CDATA[ Risk that comes from mobile and IoT devices must be factored into the enterprise security program. Security leaders need to be looking at those risks holistically and strategically, rather than operat... ]]></description>
                <author><![CDATA[ jefforr@gmail.com (Jeff Orr) ]]></author>
                <guid>https://www.cshub.com/mobile/articles/rsac2020-iot-is-officially-part-of-enterprise-mobility?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:18:12 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Email Phishing Overshadows Risk Of Mobile Malware]]></title>
                <link>https://www.cshub.com/mobile/articles/email-phishing-overshadows-risk-of-mobile-malware?utm_medium=RSS</link>
                <description><![CDATA[ Like the mobile device’s counterpart, workstations and laptops, many loaded malware campaigns begin with phishing attempts. Cyber Security Hub developed a market report to explore the perceptions, cha... ]]></description>
                <author><![CDATA[ jefforr@gmail.com (Jeff Orr) ]]></author>
                <guid>https://www.cshub.com/mobile/articles/email-phishing-overshadows-risk-of-mobile-malware?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:18:12 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Incident Of The Week: FaceApp Now Viral For Security Risks]]></title>
                <link>https://www.cshub.com/mobile/articles/incident-of-the-week-faceapp-now-viral-for-security-risks?utm_medium=RSS</link>
                <description><![CDATA[ FaceApp has become popular for its ability to take a photo of anyone’s face and age it, or transform its features. Developed by a Russian-based company, it has gone viral because many are questioning... ]]></description>
                <author><![CDATA[ alaricer@cshub.com (Alarice Rajagopal) ]]></author>
                <guid>https://www.cshub.com/mobile/articles/incident-of-the-week-faceapp-now-viral-for-security-risks?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:17:45 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[BYOD Rules And The Future Of Medical Data Security]]></title>
                <link>https://www.cshub.com/mobile/articles/byod-rules-and-the-future-of-medical-data-security?utm_medium=RSS</link>
                <description><![CDATA[ Healthcare organizations have always been extremely attractive targets to cyber criminals, so the increasing use of personal or third party mobile devices highlights a need for the implementation of m... ]]></description>
                <author><![CDATA[ bryan.fielding@iqpc.com (Bryan Fielding) ]]></author>
                <guid>https://www.cshub.com/mobile/articles/byod-rules-and-the-future-of-medical-data-security?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:18:12 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Incident Of The Week: Group FaceTime Glitch Exposes Privacy Breach]]></title>
                <link>https://www.cshub.com/mobile/articles/incident-of-the-week-group-facetime-glitch-exposes-privacy-breach?utm_medium=RSS</link>
                <description><![CDATA[ According to The New York Times, on Jan. 19, a 14-year-old from Arizona discovered a glitch using FaceTime, Apple’s video chatting software — he could eavesdrop on his friend’s phone before his friend... ]]></description>
                <author><![CDATA[ alaricer@cshub.com (Alarice Rajagopal) ]]></author>
                <guid>https://www.cshub.com/mobile/articles/incident-of-the-week-group-facetime-glitch-exposes-privacy-breach?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:18:12 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Best Practices For Protecting Mobile Devices]]></title>
                <link>https://www.cshub.com/mobile/articles/best-practices-for-protecting-mobile-devices?utm_medium=RSS</link>
                <description><![CDATA[ In the era of mobility, enterprises must be cognizant about the potential threats on the horizon. Nearly every employee has at least one mobile device that they use for work. Likewise, these devices r... ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/mobile/articles/best-practices-for-protecting-mobile-devices?utm_medium=RSS</guid>
                <pubDate>Tue, 05 Sep 2023 13:48:02 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[5 Reasons To Use Biometrics To Secure Mobile Devices]]></title>
                <link>https://www.cshub.com/mobile/articles/5-reasons-to-use-biometrics-to-secure-mobile-devices?utm_medium=RSS</link>
                <description><![CDATA[ It is no secret that mobile devices are under attack. From phishing scams to a host of other issues, mobile devices are increasingly seen as a vulnerability in the enterprise, and as an easy target fo... ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/mobile/articles/5-reasons-to-use-biometrics-to-secure-mobile-devices?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:18:12 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[7 Mobile Security Bloggers To Follow]]></title>
                <link>https://www.cshub.com/mobile/articles/7-mobile-security-bloggers-to-follow?utm_medium=RSS</link>
                <description><![CDATA[ With new enterprise mobile device security threats and vulnerabilities being discovered on a frequent basis, it helps to read analysis from numerous industry leaders. ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/mobile/articles/7-mobile-security-bloggers-to-follow?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:18:12 +0000</pubDate>
            </item>
            </channel>
</rss>