Please turn on your JavaScript for this page to function normally.
speed
The evolution of cloud and mobile security

In this podcast recorded at RSA Conference 2017, Salim Hafid, Product Marketing Manager at Bitglass, talks about how organizations are dealing with BYOD, cloud security, and …

mobile device
500,000+ devices have dangerous apps installed

At Mobile World Congress (MWC) 2017, connected cars, the future of smart homes and, of course, the newest handsets are top of the agenda. Intel Security’s latest findings show …

smartphone
Consumers regularly share passcodes, creating compromising situations

Consumers keep more and more sensitive personal and professional information on their mobile phones, but most people remain alarmingly casual about adequately protecting that …

BYOD
Employees rely largely on personally owned mobile devices in the workplace

Mobile device adoption in the workplace is not yet mature, found a recent survey from Gartner. Although 80 percent of workers surveyed received one or more corporate-issued …

gift
This year’s most hackable holiday gifts

Intel Security announced its second annual McAfee Most Hackable Holiday Gifts list to identify potential security risks associated with hot-ticket items this holiday season. …

Wi-Fi
Mobile pros are addicted to Wi-Fi, connectivity impacts their choices

iPass surveyed more than 1,700 mobile professionals worldwide about their connectivity habits and preferences, highlighting the ever-increasing influence of Wi-Fi on our daily …

iStorage diskAshur Pro
Review: iStorage diskAshur Pro SSD

The iStorage diskAshur Pro SSD is the hard drive for users with security on their mind. This USB 3.0 device comes in various storage capacities, ranging from 128GB to 1TB, and …

travel
Traveling on business? Beware of targeted spying on mobile

Corporate spying is a real threat in the world of cyber war. Employees traveling on behalf of their company could create opportunities for sophisticated adversaries to take …

smartphone
When smartphone upgrades go wrong

As the holiday shopping season kicks into full gear around the world, industry analysts predict low prices, discounts and promotions will entice shoppers to buy the latest …

iCloud spam
Mobile users actively spammed from compromised iCloud accounts

Spammers have been compromising North American Apple users’ iCloud accounts, and using them to send spammy text messages to mobile users in China. The messages advertise …

Google Nexus
Hack a Nexus from afar, get $200,000

Google has issued a challenge to bug hunters around the world: find a vulnerability or bug chain that achieves remote code execution on multiple Android devices knowing only …

Stingray
Stingray use lacks transparency and meaningful oversight

Cell-site simulators – aka Stingrays, aka IMSI catchers – are widely used by US law enforcement, usually without a warrant that such type of surveillance should …

Don't miss

Cybersecurity news