Please turn on your JavaScript for this page to function normally.
Security intelligence solutions for mobile technology providers

Webroot announced the availability of a portfolio of internet security solutions that give mobile technology providers – from carriers to device manufacturers to mobile …

The arrival of the post-PC threat era

With the release of its 2012 Annual Roundup and Mobile Security reports, Trend Micro documents how cybercriminals have moved beyond the PC, targeting Android, social media and …

Fake game apps flood Google Play

Android users are once again in danger of getting their information collected and being hit by an unending stream of spam and unwelcome offers just because they searched for …

The end of strong password-only security

More than 90% of user-generated passwords will be vulnerable to hacking in a matter of seconds, according to Deloitte’s Canadian Technology, Media & …

Many Fed smartphones have zero password protection

A new report showcases increased security risks with mobile device usage within Federal government as adoption of smartphones and other mobile devices becomes more widespread. …

Mobile Security for Android combats mobile threats

Commtouch announced Mobile Security for Android, an OEM solution that offers cloud-assisted antivirus and Web security services delivered through a client SDK. Mobile Security …

Sophos tackles BYOD challenges

Sophos announced Sophos EndUser Protection, a new security offering that tackles the challenges associated with bring-your-own-device (BYOD), and the increasing number of …

Infographic: Is your device safe at CES?

The technology supershow known as CES is taking place in Las Vegas this week. Novell released an infographic that looks at mobile security and breaks down a number of figures …

Keycard: Unlock your Mac using an iOS device

Keycard allows you to pair your iPhone or other Bluetooth enabled device with your Mac to lock and unlock your computer. It detects when you’re leaving your desk, …

Object storage predictions for 2013

Object storage is primed for growth, according to Mark Goros , CEO of Caringo, a provider of object storage software. Goros predicts 2013 will include a number of advancements …

Rapid-fire changes to information security strategies

RSA released a special report from the Security for Business Innovation Council (SBIC) that assesses how disruptive innovations such as Big Data analytics, cloud computing, …

IT GRC auditor outlines trends for the new year

As the new year kicks off, Coalfire, an independent IT GRC auditor, compiled their predictions for cybersecurity in 2013. “Last year was a very active year in the …

Don't miss

Cybersecurity news