Please turn on your JavaScript for this page to function normally.
Tips to minimize the risk of identity fraud

Javelin Strategy & Research recommends that consumers follow a three-step approach to minimize their risk and impact of identity fraud. Prevention 1. Keep personal data …

Application security intelligence combats mobile threats

Cenzic introduced a new application security intelligence service that secures mobile applications on all mobile platforms, via the cloud. The new solution scans and provides …

Security toolkit for online mobile applications

KOBIL Systems introduced mIDentity App Security Toolkit, which protects mobile users from security attacks. KOBIL offers two reference implementations of this toolkit: …

Malware surpassed 75 million samples in 2011

McAfee released its latest threats report, revealing that malware surpassed the company’s estimate of 75 million unique malware samples last year. Although the release …

New solution and certification addresses the BYOD challenge

Aruba Networks introduced ClearPass, an access management system for the secure provisioning of mobile devices on any enterprise network. It’s designed to enable IT …

Hackers can find you by tracking your cellphone

Finding out people’s approximate whereabouts by tracing their cellphone signal is something that service providers can easily do, as cellular networks track its …

How mobile malware is maturing

Mobile malware has reached a new stage of maturation, according to Juniper Networks. Top findings from Juniper’s 2011 Mobile Threats Report are evidence of accelerating …

Imation secures mobile data, identity and workspaces

Imation announced its unified Secure Data, Identity and Mobile Workspace product set, which brings together a combination of encrypted USB storage devices and media, …

Social mobile apps found storing users’ contacts without permission

A week ago, app developer Arun Thampi made public his discovery that Path – a popular iOS app that allows users to keep a journal of their everyday life and share it …

Cloud-based security of mobile devices via Active Directory

Centrify announced DirectControl for Mobile, a cloud-based service lets enterprises centrally secure and manage smart phones and tablets using existing Active Directory …

Mobile hacks to increase with SDR adoption

Digital Assurance warned that mobile communications operating over radio systems such as GSM, WiMax and DECT are likely to become more heavily targeted as Software Defined …

Security architecture for trusted execution environments

Elliptic Technologies introduced the tVault Security Architecture – a technology that enables end-to-end security in connected devices. tVault provides robust security …

Don't miss

Cybersecurity news