Please turn on your JavaScript for this page to function normally.
Employees continue to use risky apps on mobile devices

Risky applications and business applications are being used side-by-side on devices owned by employees that are used for work, according to a survey by the SANS Institute. …

Parents should be concerned about app security

Veracode released an infographic outlining the importance of mobile application security for children. It provides parents with tips for protecting their children, their …

Addonics releases CipherUSB family of hardware encryption solutions

Addonics Technologies announced a family of USB hardware encryption solutions that protect data stored on hard drives, removable drives, flash media, optical media or in the …

Can mobile malware be activated via sensors?

Can mobile malware be activated via sensors available on current mobile devices, and receive commands through out-of-band communication methods? If you ask a group of …

Fighting cybercrime is on the right track

Despite the numerous security incidents that took place during the first quarter of the year, the fight against cyber-crime is on the right track, according to PandaLabs. …

Wi-Fi client security weaknesses still prevalent

Google Android, Apple iOS, BlackBerry, and Windows Mobile devices have an inherent security weakness in the method they use for connecting to Wi-Fi networks that has the …

Application vulnerabilities still a top security concern

Respondents to a new (ISC)2 study identified application vulnerabilities as their top security concern. A significant gap persists between software developers’ …

McAfee launches security service with facial and voice recognition

McAfee announced McAfee LiveSafe, an unlimited cross-device security service that uses facial and voice recognition technology to protect users’ digital lives. The …

Can mobile devices be more secure than PCs?

Mobile devices continue to fight an inaccurate perception that they’re not as secure as traditional PCs. Entrust believes that mobile devices, when properly managed and …

A radical shift in security needs

During the last 40 years we’ve seen a small number of significant, user-driven shifts in the computing landscape, which change the way businesses and IT departments …

New mobile security practice from Trustwave

Trustwave unveiled a new mobile security practice designed to help businesses embrace mobility and BYOD programs while maintaining compliance, managing security risks and …

Hackers challenged to crack unhackable secure messaging app

Swiss-based U.K. firm Redact has launched a new app which, they claim, offers a completely secure way of exchanging encrypted messages from iPhone to iPhone and even the …

Don't miss

Cybersecurity news