mobile devices
Most SMB employees in fear of identity theft in the workplace
The smaller business workplace has transformed into a mobile-enabled, agile, and satisfying environment, but one where the workforce is acutely aware and worried about the …
Explosive growth of advanced attacks and malicious traffic
The Cisco 2014 Annual Security Report, released today, reveals that threats designed to take advantage of users’ trust in systems, applications and personal networks …
Mobile applications being used for DDoS attacks
Prolexic Technologies reported that mobile applications are being used in DDoS attacks against enterprise customers. “The prevalence of mobile devices and the widespread …
Understanding mobile security pressure points and vulnerabilities
41 percent of the government employees who used the assessment tool are putting themselves and their agencies at risk with existing mobile device habits, according to a Mobile …
What drives salary hikes for IT professionals?
The biggest salary increases for IT professionals are for roles that demand specific experience in big data analytics; ecommerce and mobile; and IT security. Salaries for all …
Seagate’s 2TB external hard drive now backs up your phone
Seagate today announced the second generation of its sleek external storage lineup, Seagate Backup Plus Slim. This new offering includes the backup software, Seagate …
Key trends in ransomware, evasion techniques and social attacks
McAfee Labs released a predictions report, analyzing 2013 trends through its Global Threat Intelligence (GTI) service to forecast the threat landscape for the coming year. In …
Sophisticated and targeted attacks on the horizon
As 2013 draws to a close, Gavin Millard a security expert from Tripwire gazes into his crystal ball and predicts what 2014 has in store for us. Targeted mobile attacks will …
Will 2014 be the year of encryption?
Security experts at Unisys predicted that the coming year will usher in broad-based adoption of encryption as enterprises respond to recent disclosures that unencrypted data …
Convenience still overrides security for mobile shoppers
Despite a huge increase in shopping on mobile handsets, shoppers do not have security in place to protect the identity and credit card data stored on the devices, according to …
IBM prevents services from running compromised code
IBM inventors have patented a technique that can enable businesses to improve cloud security and support secure transactions by preventing mobile devices from accessing …
CIOs lack the vision when it comes to mobility
Mobile Helix announced the findings of an independent CIO survey of 300 IT decision makers in the UK and US; exploring how enterprises are making use of mobile technology. The …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments