Wi-Fi client security weaknesses still prevalent
Google Android, Apple iOS, BlackBerry, and Windows Mobile devices have an inherent security weakness in the method they use for connecting to Wi-Fi networks that has the …
U.S. DOD decides iPhones and iPads can connect to its networks
The Defense Information Systems Agency (DISA) of the U.S. Department of Defense has approved the use of government-issued iOS 6 devices when connecting to its military …
Police unable to decrypt iPhones, asks Apple to do it
Court documents from a drug trial in Kentucky have revealed that the U.S. federal Bureau of Alcohol, Tobacco, Firearms and Explosives nor any other U.S. local, state, or …
Codeproof for iOS
Codeproof Technologie is a SaaS (Software-as-a-Service) provider from Redmond that offers a mobile device management (MDM) solution for Android and iOS devices. This review …
Hackers challenged to crack unhackable secure messaging app
Swiss-based U.K. firm Redact has launched a new app which, they claim, offers a completely secure way of exchanging encrypted messages from iPhone to iPhone and even the …
Secure Microsoft Office collaboration via any device
WatchDox Apps for WatchDox Enterprise and Enterprise ES is the first offering to grant enterprise users secure Microsoft Office collaboration capabilities via any desktop, …
Use your iPhone for biometric scanning
AOptix unveiled AOptix Stratus, the first comprehensive mobile identity solution “Made for iPhone” delivering iris, fingerprint, voice, and face recognition in a …
Lookout for iPhone
One of the recent issues of Forbes magazine featured a three-page story on Lookout Inc., the company that, according to the article, has been able to trounce …
Route1 releases MobiKEY for iPad
Route1 released MobiKEY technology for the iPad. MobiKEY is a complete desktop, secure remote access technology that integrates multi-factor authentication and identity …
Enterprise mobility cloud report reveals iOS domination
Citrix released its Enterprise mobility cloud report, revealing key trends that are shaping the enterprise mobility market. The report is based on aggregate data from Citrix …
Protecting sensitive information on iOS devices
We’ve seen the deep technical research showing what makes iOS devices secure (or sometimes not so much). But once you grok ASLR and code signing, are you really any …
Featured news
Resources
Don't miss
- Cisco fixes ClamAV vulnerability with available PoC and critical Meeting Management flaw
- SonicWall SMA appliances exploited in zero-day attacks (CVE-2025-23006)
- Defense strategies to counter escalating hybrid attacks
- Web Cache Vulnerability Scanner: Open-source tool for detecting web cache poisoning
- Funding soars in a milestone year for Israeli cybersecurity