Please turn on your JavaScript for this page to function normally.
Fake game apps flood Google Play

Android users are once again in danger of getting their information collected and being hit by an unending stream of spam and unwelcome offers just because they searched for …

The end of strong password-only security

More than 90% of user-generated passwords will be vulnerable to hacking in a matter of seconds, according to Deloitte’s Canadian Technology, Media & …

Many Fed smartphones have zero password protection

A new report showcases increased security risks with mobile device usage within Federal government as adoption of smartphones and other mobile devices becomes more widespread. …

Mobile Security for Android combats mobile threats

Commtouch announced Mobile Security for Android, an OEM solution that offers cloud-assisted antivirus and Web security services delivered through a client SDK. Mobile Security …

Sophos tackles BYOD challenges

Sophos announced Sophos EndUser Protection, a new security offering that tackles the challenges associated with bring-your-own-device (BYOD), and the increasing number of …

Infographic: Is your device safe at CES?

The technology supershow known as CES is taking place in Las Vegas this week. Novell released an infographic that looks at mobile security and breaks down a number of figures …

Keycard: Unlock your Mac using an iOS device

Keycard allows you to pair your iPhone or other Bluetooth enabled device with your Mac to lock and unlock your computer. It detects when you’re leaving your desk, …

Object storage predictions for 2013

Object storage is primed for growth, according to Mark Goros , CEO of Caringo, a provider of object storage software. Goros predicts 2013 will include a number of advancements …

Rapid-fire changes to information security strategies

RSA released a special report from the Security for Business Innovation Council (SBIC) that assesses how disruptive innovations such as Big Data analytics, cloud computing, …

IT GRC auditor outlines trends for the new year

As the new year kicks off, Coalfire, an independent IT GRC auditor, compiled their predictions for cybersecurity in 2013. “Last year was a very active year in the …

Ten tips for mobile security

Mobile devices have become increasingly common and the markets are flooded with new applications for business and entertainment. People are using mobile devices to play games, …

Cloud exploits and mobile device attacks on the horizon

Although many security experts predict that the most likely data breach threats organizations will face in 2013 include cloud exploits, mobile device attacks and all-out cyber …

Don't miss

Cybersecurity news