mobile devices
Unisys Stealth for Mobile solution protects against BYOD issues
Unisys announced the Unisys Stealth for Mobile solution to address the security concerns facing enterprises as growing numbers of their employees use consumer devices at work. …
Free secure messaging app from Carnegie Mellon researchers
Carnegie Mellon University CyLab researchers have developed a free smartphone app for iOS and Android users to safely exchange identity data without risk of theft, deception …
Emulex releases appliance for cloud, security and mobile deployments
Emulex announced the new EndaceFlow 3040 NetFlow generator appliance, which is purpose-built for use with high-density 10GbE networks, generates 100 percent accurate NetFlows …
Are workers drowning in a sea of ineffective technology?
With the rise of mobile, the cloud and multiple device use, today’s workers are more connected than ever before, giving them access to high-volume streams of information …
Average online bank account is accessed by 2.4 unique devices
Each month, The ThreatMetrix Global Trust Intelligence Network (The Network) screens more than 500 million site visitors, across more than 1,900 customers and 9,000 websites …
Protect high-value transactions on iOS and Android
SecureKey introduced its enhanced cloud-based briidge.net Connect multi-factor authentication service. This latest version of briidge.net Connect incorporates the new …
Researcher despairs of critical SIM flaws being fixed before attacks happen
Two months have passed since researcher Karsten Nohl announced that he has found and managed to leverage critical flaws in the encryption technology used by some SIM cards, …
Eight arrested over £1.3 million theft from Barclays bank
Eight men have been arrested by the Metropolitan Police’s Central e-Crime Unit (PCeU) in connection with a £1.3 million theft by a gang who stole the money by …
Mobile data security remains weak
Coalfire surveyed 400 individuals working in a variety of industries across North America who are not affiliated with their company’s IT department. Survey findings show …
The legal implications of BYOD
The legality of the common practice of remotely wiping or tracking an employee’s mobile device while asking workers to sign waivers giving their consent for such a …
Mobile Pwn2Own: $300k prize pool awaits successful contestants
The next Mobile Pwn2own competition is to be held in November at the PacSec Applied Security Conference in Tokyo, and contestants can earn as much as $100,000 for a successful …
Travelers regularly connect to free, unsecure Wi-Fi networks
GFI Software announced the findings of an extensive independent research project looking at end user use of mobile devices at work and in their daily commute to and from the …
Featured news
Resources
Don't miss
- Microsoft introduces protection against email bombing
- Sudo local privilege escalation vulnerabilities fixed (CVE-2025-32462, CVE-2025-32463)
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it