Please turn on your JavaScript for this page to function normally.
Over 50% use unauthorized file sharing apps at work

While BYOD and free, cloud-based file-sharing is on the rise, IT administrators are largely unable to police the use of these tools within their organizations, according to …

People would rather lose their wallet than their phone

People would prefer to lose the contents of their wallets than their mobile phones. A SecurEnvoy study asked what people would most fear losing from their back pocket – …

IBM releases software for developing secure mobile apps

IBM announced new software to help organizations develop mobile applications that are more secure by design. Now, clients can build security into the initial design of their …

iOS and Android security solutions from F-Secure

F-Secure Mobile Security, which provides protection for Android phones and tablets, can now be purchased on Google Play. F-Secure Child Safe, which is a browser for parental …

Cybercrime goes mobile

Corporate espionage has never been so easy. See how a simple app can transform your smartphone into an espionage tool in the hands of criminals, able to record your …

How to remove the backdoor from ZTE’s Score M smartphone

The existence of the recently discovered vulnerability in ZTE’s Score M smartphone which allows any attacker in possession of the hardcoded password to access and take …

Nominum releases mobile security solution

Faster mobile networks, explosive consumer demand, more powerful smartphones, and the influx of non-handset mobile-ready devices make mobile networks an attractive option for …

Testing program of VPN security for mobile devices

To help millions of enterprise users of smartphones and tablets send and receive data securely, ICSA Labs is offering a testing program for determining whether these devices …

Financial fraud drives most targeted attacks

Check Point announced the results of a new survey revealing 65% of organizations who experienced targeted attacks reported that the hacker’s motivation was driven by …

BYOD adoption is growing despite security concerns

While organizations are taking considerable steps towards BYOD adoption, network and bandwidth issues remain significant barriers for many. The Aruba survey found that 69 …

LOK-IT Secure Flash Drive

After a couple of years of research and development, LOK-IT was announced at the RSA Conference 2011 in San Francisco. The product boasted a unique concept of PIN-based …

Leveraging PCI standards to accept mobile payments securely

The PCI Security Standards Council (PCI SSC) published a customized fact sheet outlining how merchants can securely accept payments using mobile devices such as smartphones or …

Don't miss

Cybersecurity news