mobile devices
Security toolkit for online mobile applications
KOBIL Systems introduced mIDentity App Security Toolkit, which protects mobile users from security attacks. KOBIL offers two reference implementations of this toolkit: …
Malware surpassed 75 million samples in 2011
McAfee released its latest threats report, revealing that malware surpassed the company’s estimate of 75 million unique malware samples last year. Although the release …
New solution and certification addresses the BYOD challenge
Aruba Networks introduced ClearPass, an access management system for the secure provisioning of mobile devices on any enterprise network. It’s designed to enable IT …
Hackers can find you by tracking your cellphone
Finding out people’s approximate whereabouts by tracing their cellphone signal is something that service providers can easily do, as cellular networks track its …
How mobile malware is maturing
Mobile malware has reached a new stage of maturation, according to Juniper Networks. Top findings from Juniper’s 2011 Mobile Threats Report are evidence of accelerating …
Imation secures mobile data, identity and workspaces
Imation announced its unified Secure Data, Identity and Mobile Workspace product set, which brings together a combination of encrypted USB storage devices and media, …
Social mobile apps found storing users’ contacts without permission
A week ago, app developer Arun Thampi made public his discovery that Path – a popular iOS app that allows users to keep a journal of their everyday life and share it …
Cloud-based security of mobile devices via Active Directory
Centrify announced DirectControl for Mobile, a cloud-based service lets enterprises centrally secure and manage smart phones and tablets using existing Active Directory …
Mobile hacks to increase with SDR adoption
Digital Assurance warned that mobile communications operating over radio systems such as GSM, WiMax and DECT are likely to become more heavily targeted as Software Defined …
Security architecture for trusted execution environments
Elliptic Technologies introduced the tVault Security Architecture – a technology that enables end-to-end security in connected devices. tVault provides robust security …
Security for IT consumerization
Lancope announced that its StealthWatch System extends network visibility to mobile devices for the security of bring-your-own-device (BYOD) environments. By analyzing mobile …
Mobile security experts converge on Munich for Amphion Forum
The Amphion Forum, launched in the United States last year by the same entrepreneur that founded the global RSA Conferences, has established itself as the hottest event for …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints