Please turn on your JavaScript for this page to function normally.
Library
Success of the Internet of Things depends on privacy and security

Even as the Internet of Things (IoT) creates new usages, systems and ways to manage and store data, there is a parallel need for impermeable privacy policies and protection …

Frame
Most companies do nothing to protect their mobile apps

There’s a wide disparity between consumer confidence in the level of security incorporated into mobile health and finance apps and the degree to which organizations …

Kingston DataTraveler 2000
Kingston releases encrypted USB with keypad access

Kingston released the DataTraveler 2000 encrypted USB 3.0 Flash drive, which offers hardware encryption and PIN protection with access through an onboard alphanumeric keypad. …

Android
January Android security update fixes 5 critical flaws, removes unneeded component

Google has released the January security update for Android (for its Nexus devices). The update fixes 12 issues, five of which are critical. The most important hole …

Keyboard
Confusion about IT security leaves devices at risk

When it comes to Internet security, consumer concern and awareness are both on the increase. However, despite a growing recognition of the need to protect devices, many …

business
Top trends that will influence your security decisions in 2016

With 2016 almost here, many of us are making critical decisions regarding new security projects. Determining just where to focus and spend our limited resources is never easy, …

100,000 laptops and phones left in UK bars each year

UK bars guzzle up a staggering 138,000 mobile phones and laptops each year, and alarmingly 64 percent of the devices do not have any security protection installed, which means …

Headache
“Backstabbing” malware steals mobile backups via infected computers

In this day and age, our mobile devices carry more personal and business information than any other electronic device. Is it any wonder, then, that attackers want to have …

Cybercriminals to target new payment technologies

The year 2015 has become widely referred to as the year of the data breach. What nefarious cyber-acts will define 2016? Raytheon|Websense cybersecurity experts today shared …

Windows machines stop trusting Dell’s two unconstrained root CA certs

Microsoft has updated the Certificate Trust list for all supported releases of Microsoft Windows so that the two digital certificates (complete with inadvertently disclosed …

Five big technology predictions into 2016

1. Security will be the biggest issue in the ICT industry driven by rapid adoption of Cloud, Mobility and the Internet of Things As platforms become more open due to the rapid …

Mobile users continue to put personal and corporate data at risk

Blancco Technology Group surveyed over 1,400 mobile users in the United States, Canada, UK and Australia, and found that inadequate security precautions taken by mobile users …

Don't miss

Cybersecurity news