mobile devices
Over 50% use unauthorized file sharing apps at work
While BYOD and free, cloud-based file-sharing is on the rise, IT administrators are largely unable to police the use of these tools within their organizations, according to …
People would rather lose their wallet than their phone
People would prefer to lose the contents of their wallets than their mobile phones. A SecurEnvoy study asked what people would most fear losing from their back pocket – …
IBM releases software for developing secure mobile apps
IBM announced new software to help organizations develop mobile applications that are more secure by design. Now, clients can build security into the initial design of their …
iOS and Android security solutions from F-Secure
F-Secure Mobile Security, which provides protection for Android phones and tablets, can now be purchased on Google Play. F-Secure Child Safe, which is a browser for parental …
Cybercrime goes mobile
Corporate espionage has never been so easy. See how a simple app can transform your smartphone into an espionage tool in the hands of criminals, able to record your …
How to remove the backdoor from ZTE’s Score M smartphone
The existence of the recently discovered vulnerability in ZTE’s Score M smartphone which allows any attacker in possession of the hardcoded password to access and take …
Nominum releases mobile security solution
Faster mobile networks, explosive consumer demand, more powerful smartphones, and the influx of non-handset mobile-ready devices make mobile networks an attractive option for …
Testing program of VPN security for mobile devices
To help millions of enterprise users of smartphones and tablets send and receive data securely, ICSA Labs is offering a testing program for determining whether these devices …
Financial fraud drives most targeted attacks
Check Point announced the results of a new survey revealing 65% of organizations who experienced targeted attacks reported that the hacker’s motivation was driven by …
BYOD adoption is growing despite security concerns
While organizations are taking considerable steps towards BYOD adoption, network and bandwidth issues remain significant barriers for many. The Aruba survey found that 69 …
LOK-IT Secure Flash Drive
After a couple of years of research and development, LOK-IT was announced at the RSA Conference 2011 in San Francisco. The product boasted a unique concept of PIN-based …
Leveraging PCI standards to accept mobile payments securely
The PCI Security Standards Council (PCI SSC) published a customized fact sheet outlining how merchants can securely accept payments using mobile devices such as smartphones or …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments