mobile devices
Fake Google Play site serves Android malware
Online scammers are known for their adaptability, so it should not come as a surprise that the recent name change of Google’s official Android Market – now dubbed …
A decade of vulnerabilities and predictions for 2012
Since 2001, Spanish security firm S21sec has been been compiling a database of vulnerabilities detected by themselves and those reported by a great number of sources which …
BYOD security for cloud Wi-Fi access
AirTight Networks introduced device fingerprinting techniques in its SpectraGuard Enterprise WIPS and AirTight Cloud Services that provide BYOD security and detection, …
Data protection risks on mobile devices
An increasing number of professionals (80 percent) work remotely and rely on personal devices such as smartphones (63 percent), iPads (30 percent) and laptops (80 percent) to …
CIO concerns over mobile data security
UK CIOs and IT managers are increasingly concerned about data protection on mobile devices, according to Sophos. Three quarters of those surveyed have had to deal with lost or …
Voltage Security unveils Mobile Plus initiative
Voltage Security announced Voltage Security Mobile Plus, an initiative to extend its existing mobile security solutions to protect the new generation of mobile devices, …
Identity, app and mobile device monitoring
Lancope unveiled the latest version of its StealthWatch System, which harnesses the power of NetFlow and other flow data from existing infrastructure to cost-effectively …
Turning mobile devices into enterprise credentials
Entrust is extending its Entrust IdentityGuard strong authentication platform to offer smart credentials on mobile devices for enterprise-grade security. Taking advantage of …
Employees are deliberately disabling security controls
Corporate mobile devices and the bring-your-own-device (BYOD) phenomenon are rapidly circumventing enterprise security and policies, say the results of a new global study …
EMC unveils five new security advisory services
Virtualization, cloud computing, mobile technologies, and the emergence of a new class of Big Data applications have dramatically altered how organizations create, deliver, …
CSA launches mobile and innovation initiatives
The Cloud Security Alliance announced two significant new initiatives for 2012, addressing growing areas of need in cloud security – mobile computing and innovation. …
Design guidelines for mobile app privacy
The GSM Association (GSMA), with the support of mobile operators in Europe and following consultation across the wider mobile ecosystem, has published a set of global Privacy …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments