Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Newswire

Security Firm Lists 'Dirty Dozen' Unsafe Smartphones

Old Newswire Feature Image
November 21, 2011

Bit9 researchers has compiled a list of 12 smartphones that pose the highest security and privacy risks to consumers and corporations.

The phones, all Android models, on the "Dirty Dozen list compiled by Bit9 of Waltham, Mass. are:

  • Samsung Galaxy Mini
  • HTC Desire
  • Sony Ericsson Xperia X10
  • HTC Wildfire
  • Samsung Epic 4G
  • LG Optimus S
  • Samsung Galaxy S
  • Motorola Droid X
  • LG Optimus One
  • Motorola Droid 2
  • HTC Evo 4G

In compiling the list, Bit9 researchers looked at the market share of the smartphone, what out-of-date and insecure software the model had running on it and how long it took for the phone to receive updates.

  • Read Bit9's full report at  http://www.bit9.com/orphan-android/
  •  
  • Share This Story

    Looking for a reprint of this article?
    From high-res PDFs to custom plaques, order your copy today!

    Recommended Content

    JOIN TODAY
    To unlock your recommendations.

    Already have an account? Sign In

    • Security's Top Cybersecurity Leaders 2024

      Security's Top Cybersecurity Leaders 2024

      Security magazine's Top Cybersecurity Leaders 2024 award...
      Top Cybersecurity Leaders
      By: Security Staff
    • cyber brain

      The intersection of cybersecurity and artificial intelligence

      Artificial intelligence (AI) is a valuable cybersecurity...
      Security Leadership and Management
      By: Pam Nigro
    • artificial intelligence AI graphic

      Assessing the pros and cons of AI for cybersecurity

      Artificial intelligence (AI) has significant implications...
      Logical Security
      By: Charles Denyer
    Subscribe For Free!
    • Security eNewsletter & Other eNews Alerts
    • eMagazine Subscriptions
    • Manage My Preferences
    • Online Registration
    • Mobile App
    • Subscription Customer Service

    Security’s Top 5 – 2024 Year in Review

    Security’s Top 5 – 2024 Year in Review

    Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

    Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

    The Money Laundering Machine: Inside the global crime epidemic - Episode 24

    The Money Laundering Machine: Inside the global crime epidemic - Episode 24

    More Videos

    Sponsored Content

    Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

    close
    • Crisis Response Team
      Sponsored byEverbridge

      Automate or Fall Behind – Crisis Response at the Speed of Risk

    • Perimeter security
      Sponsored byAMAROK

      Why Property Security is the New Competitive Advantage

    • Duty of Care
      Sponsored byAMAROK

      Integrating Technology and Physical Security to Advance Duty of Care

    Popular Stories

    White post office truck

    Department of Labor Sues USPS Over Texas Whistleblower Termination

    Internal computer parts

    Critical Software Vulnerabilities Rose 37% in 2024

    Coding

    AI Emerges as the Top Concern for Security Leaders

    Person working on laptop

    Governance in the Age of Citizen Developers and AI

    patient at healthcare reception desk

    Almost Half of Healthcare Breaches Involved Microsoft 365

    2025 Security Benchmark banner

    Events

    June 24, 2025

    Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

    For today's security teams, making informed decisions in the first moments of a crisis is critical.

    September 29, 2025

    Global Security Exchange (GSX)

     

    View All Submit An Event

    Products

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

    See More Products

    Related Articles

    • cyber attack

      Organizations concerned about enterprise security from unsafe VPNs

      See More
    • Police crime scene tape

      FBI, DHS Book Lists the 46 Indicators of Potential Violent Extremists

      See More
    • New Newswire Feature Image 3/8/2012

      Report Lists Cities Most Likely to be Hit by a Terrorism Attack

      See More
    ×

    Sign-up to receive top management & result-driven techniques in the industry.

    Join over 20,000+ industry leaders who receive our premium content.

    SIGN UP TODAY!
    • RESOURCES
      • Advertise
      • Contact Us
      • Store
      • Want More
    • SIGN UP TODAY
      • Create Account
      • eMagazine
      • eNewsletter
      • Customer Service
      • Manage Preferences
    • SERVICES
      • Marketing Services
      • Reprints
      • Market Research
      • List Rental
      • Survey/Respondent Access
    • STAY CONNECTED
      • LinkedIn
      • Facebook
      • YouTube
      • X (Twitter)
    • PRIVACY
      • PRIVACY POLICY
      • TERMS & CONDITIONS
      • DO NOT SELL MY PERSONAL INFORMATION
      • PRIVACY REQUEST
      • ACCESSIBILITY

    Copyright ©2025. All Rights Reserved BNP Media.

    Design, CMS, Hosting & Web Development :: ePublishing

    Security Magazine logo
    search
    cart
    facebook twitter linkedin youtube
    • Sign In
    • Create Account
    • Sign Out
    • My Account
    Security Magazine logo
    • NEWS
      • Security Newswire
      • Technologies & Solutions
    • MANAGEMENT
      • Leadership Management
      • Enterprise Services
      • Security Education & Training
      • Logical Security
      • Security & Business Resilience
      • Profiles in Excellence
    • PHYSICAL
      • Access Management
      • Fire & Life Safety
      • Identity Management
      • Physical Security
      • Video Surveillance
      • Case Studies (Physical)
    • CYBER
      • Cybersecurity News
      • More
    • BLOG
    • COLUMNS
      • Cyber Tactics
      • Leadership & Management
      • Security Talk
      • Career Intelligence
      • Leader to Leader
      • Cybersecurity Education & Training
    • EXCLUSIVES
      • Annual Guarding Report
      • Most Influential People in Security
      • The Security Benchmark Report
      • The Security Leadership Issue
      • Top Guard and Security Officer Companies
      • Top Cybersecurity Leaders
      • Women in Security
    • SECTORS
      • Arenas / Stadiums / Leagues / Entertainment
      • Banking/Finance/Insurance
      • Construction, Real Estate, Property Management
      • Education: K-12
      • Education: University
      • Government: Federal, State and Local
      • Hospitality & Casinos
      • Hospitals & Medical Centers
      • Infrastructure:Electric,Gas & Water
      • Ports: Sea, Land, & Air
      • Retail/Restaurants/Convenience
      • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
    • EVENTS
      • Industry Events
      • Webinars
      • Solutions by Sector
      • Security 500 Conference
    • MEDIA
      • Videos
        • Cybersecurity & Geopolitical Discussion
        • Ask Me Anything (AMA) Series
      • Podcasts
      • Polls
      • Photo Galleries
    • MORE
      • Call for Entries
      • Classifieds & Job Listings
      • Continuing Education
      • Newsletter
      • Sponsor Insights
      • Store
      • White Papers
    • EMAG
      • eMagazine
      • This Month's Content
      • Advertise
    • SIGN UP!