Please turn on your JavaScript for this page to function normally.
Mobile device security is sacrificed for workforce efficiency

While mobile devices are an integral part of the workplace, the cyber security practices and budgets in most organizations are not keeping pace with the growing number of …

Security compliance is necessary for real-time mobile data access

Security compliance often varies from organisation to organisation due to varied industry regulation as well as internal security policies and procedures. We often see …

(IN)SECURE Magazine issue 43 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 43 has been released today. Table of contents: …

75% of mobile apps will fail basic security tests

Through 2015, more than 75 percent of mobile applications will fail basic security tests, according to Gartner. Enterprise employees download from app stores and use mobile …

5 key things to consider when developing an enterprise mobility management strategy

To state the obvious, business success today is dependent on an organization’s ability to empower its mobile workforce. Corporate resources – including …

Malicious and risky apps on Android and iOS

Knowingly or unknowingly to the user, some apps can collect GPS data, grab your contact information, your phone ID, email address, etc. In this podcast recorded at Black Hat …

9 ways to protect data on your smartphone

Recent headlines of Hollywood celebrities’ nude photos leaking onto the Internet remind us of the privacy risks we face when we store personal data – particularly …

Cellphone surveillance systems can track almost anybody

The surveillance tech industry is booming, and we should be worried about it. Poorly regulated and exceedingly secretive, the companies that create surveillance solutions for …

iStorage datAshur Personal
Using the iStorage datAshur Personal secure USB flash drive

The iStorage datAshur Personal is a PIN-activated USB flash drive designed for everyday use, both private and corporate. The drive comes in three sizes: 8GB, 16GB and 32GB.

Mobile device security: Tackling the risks

Mobile devices with their large data capacities, always on capabilities, and global communications access, can represent both a business applications’ dream and a …

Serious flaws in cell phone carrier control software found

At the Black Hat conference this week, two Accuvant researchers have disclosed serious security flaws in the carrier control software used in over 2 billion cellular devices …

Almost 1 in 10 Android apps are now malware

Cheetah Mobile Threat Research Labs analyzed trends in mobile viruses for Q1 and Q2 of 2014. Pulling 24.4 million sample files they found that 2.2 million files had viruses, …

Don't miss

Cybersecurity news