Please turn on your JavaScript for this page to function normally.
Addonics releases CipherUSB family of hardware encryption solutions

Addonics Technologies announced a family of USB hardware encryption solutions that protect data stored on hard drives, removable drives, flash media, optical media or in the …

Can mobile malware be activated via sensors?

Can mobile malware be activated via sensors available on current mobile devices, and receive commands through out-of-band communication methods? If you ask a group of …

Fighting cybercrime is on the right track

Despite the numerous security incidents that took place during the first quarter of the year, the fight against cyber-crime is on the right track, according to PandaLabs. …

Wi-Fi client security weaknesses still prevalent

Google Android, Apple iOS, BlackBerry, and Windows Mobile devices have an inherent security weakness in the method they use for connecting to Wi-Fi networks that has the …

Application vulnerabilities still a top security concern

Respondents to a new (ISC)2 study identified application vulnerabilities as their top security concern. A significant gap persists between software developers’ …

McAfee launches security service with facial and voice recognition

McAfee announced McAfee LiveSafe, an unlimited cross-device security service that uses facial and voice recognition technology to protect users’ digital lives. The …

Can mobile devices be more secure than PCs?

Mobile devices continue to fight an inaccurate perception that they’re not as secure as traditional PCs. Entrust believes that mobile devices, when properly managed and …

A radical shift in security needs

During the last 40 years we’ve seen a small number of significant, user-driven shifts in the computing landscape, which change the way businesses and IT departments …

New mobile security practice from Trustwave

Trustwave unveiled a new mobile security practice designed to help businesses embrace mobility and BYOD programs while maintaining compliance, managing security risks and …

Hackers challenged to crack unhackable secure messaging app

Swiss-based U.K. firm Redact has launched a new app which, they claim, offers a completely secure way of exchanging encrypted messages from iPhone to iPhone and even the …

Self-updating apps are now banned from Google Play

Google has made added a short but very significant clause to its Google Play Developer Program Policies, banning apps downloaded from the official store to “modify, …

Software for complex Android device security needs

Wind River has introduced three Solution Accelerators for Android Security that allow developers to quickly begin working on security requirements for Android-based devices. …

Don't miss

Cybersecurity news