Please turn on your JavaScript for this page to function normally.
Ten tips for mobile security

Mobile devices have become increasingly common and the markets are flooded with new applications for business and entertainment. People are using mobile devices to play games, …

Cloud exploits and mobile device attacks on the horizon

Although many security experts predict that the most likely data breach threats organizations will face in 2013 include cloud exploits, mobile device attacks and all-out cyber …

2013: The year of cyber war or just cyber panic?

At the end of the year experts at G Data SecurityLabs are taking a moment to look both back and forward at IT security, attacks and cyber crime. In 2012, online criminals were …

Scarlett Johansson hacker gets 10 years in prison

36-year-old Florida resident Christopher Chaney has been sentenced to 10 years in prison and to pay $66,000 restitution for having hacked the email accounts of Scarlett …

Top 7 security predictions for 2013

A seismic shift in who controls the Internet? Another Mac malware outbreak? Your smart TV being highjacked for a DDoS attack? Whatever 2013 may bring, it’s sure to be an …

McAfee mobile security app gets new privacy technology

McAfee released an enhanced version of McAfee Mobile Security featuring App Lock, an app privacy technology, as well as a completely refreshed user interface. The security …

Secure iOS file transfers with QuickDrop

CloudPrime announced QuickDrop, a safe way to communicate and send files of any type between mobile devices. It is available immediately for iOS, and will be available for Mac …

IAM solution for secure email on iOS devices

Good Technology introduced Good Vault, built on the Good Trust mobile identity and access management (IAM) platform. Good Vault extends strong two-factor authentication and …

Wireless LAN platform for mobile application delivery

Aruba Networks announced a new wireless LAN platform that addresses the explosion of mobile applications and devices challenging enterprise networks, while dramatically …

Risk study identifies top pain points in 2013

The state of endpoint risk is not improving according to the fourth annual report researched by the Ponemon Institute. IT professionals reported the flood of mobile devices …

Three major impacts when moving to a BYOD policy

Seventy percent of respondents in a recent survey by Gartner, Inc. said that they have or are planning to have BYOD policies within the next 12 months to allow employees to …

Employees use file sharing services despite bans

Large numbers of employees use Dropbox and other consumer file sharing services for sensitive work-related data, even if they know that their employer has a specific policy …

Don't miss

Cybersecurity news