mobile devices
Unsurprisingly, adults don’t read terms and conditions of mobile apps
Today, we spend more time on our smartphones and tablets than ever before, downloading games on the go, banking online or conducting the weekly grocery shop. However, despite …
Five key IT security trends for 2015
Here’s a look at five key IT security trends and solutions for 2015. Rise in security breaches The current high level of security breaches, from the largest organization …
Android Wi-Fi Direct DoS vulnerability discovered
Some Android devices are affected by a Denial of Service attack when scanning for WiFi Direct devices, according to Andres Blanco from the CoreLabs Team. An attacker could …
Why leaving a shared device unprotected is dangerous
According to a survey jointly executed by B2B International and Kaspersky Lab, 32 per cent of respondents who share an Internet-enabled device with their relatives, colleagues …
79% of professionals do business on personal devices
As employees increasingly demand a more mobile and social workplace, the pressure is on for enterprises to deliver the same technology experience employees have in their …
Biometric authentication app downloads to reach 770 million by 2019
More than 770 million biometric authentication applications will be downloaded per annum by 2019, up from just 6 million this year. This will reduce dependence on alphanumeric …
Unlock your digital world with True Key
Intel Security recently previewed True Key, a new way to unlock your digital world. It combines both password management with simple and secure multi-factor …
The hidden dangers of third party code in free apps
Research from MWR InfoSecurity has shown the various ways hackers can abuse ad networks by exploiting vulnerabilities in free mobile apps. When people install and use free …
Trends in Internet trust exploits, IoT, cyber espionage and privacy
In the third quarter, McAfee Labs detected more than 307 new threats every minute, or more than five every second, with mobile malware samples growing by 16 percent during the …
Why you should protect your wireless connection
It’s holiday shopping season again, and consumers will join the rush to buy devices and accessories for loved ones. They’ll scoop up phones and tablets, plus …
Mobile Pwn2Own 2014: Windows Phone’s sandbox resists attack
The Mobile Pwn2Own 2014 hacking competition, held at the PacSec Applied Security Conference in Tokyo, Japan, was concluded on Thursday, and not one of the targeted phones has …
Many IT pros store compromising material on their mobile phones
It appears that Jennifer Lawrence is not the only one with risqué photos on her mobile device. According to a new survey from ESET, 39 percent of the UK’s leading IT …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments