Please turn on your JavaScript for this page to function normally.
Which mobile OS is most hit by malware?

As most mobile phone users still don’t have a mobile AV solution installed on their devices, it can be rather hard to gauge just how many of them have been hit by mobile …

How to make a cheap mobile malware jail

Analyzing mobile malware without spreading it further can be very difficult to achieve, especially when one wants the malware to behave as it would in the wild. Unlike …

Fingerprint sensors for mobile ID devices

DigitalPersona launched a new generation of biometric fingerprint sensors designed specifically for the growing market of battery-powered mobile identification devices. The …

Enterprise IT spending to reach $2.7 trillion in 2012

Worldwide enterprise IT spending is projected to total $2.7 trillion in 2012, a 3.9 percent increase from 2011 spending of $2.6 trillion, according to Gartner. While …

Invisible authentication for mobile applications

RSA announced the release of software developer kits (SDKs) designed for mobile application developers to seamlessly integrate strong one-time password (OTP) or risk-based …

Android VPN client launches via fingerprint authentication

AuthenTec introduced a security solution that combines VPN client security with fingerprint recognition for Android smartphones and tablets. The QuickSec Mobile VPN Client 2.0 …

SpyEye Trojan hijacks mobile SMS security for online fraud

A stealth new attack carried out by the SpyEye Trojan circumvents mobile SMS security measures implemented by many banks. Using captured code, Trusteer discovered a two-step …

Anti-theft protection for Android and Windows devices

Norton Anti-Theft is a new Web-service that allows consumers to remotely lock, locate and recover a lost or stolen Windows based laptop, or Android smartphone or tablet. The …

Critical vulnerabilities triple in 2011

Adoption of mobile devices such as smartphones and tablets in the enterprise, including the “Bring Your Own Device” approach, which allows personal devices to …

Smartphone users choose convenience over security

In a revealing survey of smartphone and tablet users, the majority polled admit to not password protecting their mobile devices despite keeping them logged in to sensitive …

First enterprise mobile DLP solution

Zenprise announced its Mobile Enterprise Security Framework including the mobile DLP solution for managing and securing the growing number of personally owned devices entering …

WAN and network optimization API for iOS

Circadence announced an application programming interface (API) enabling WAN optimization for Apple iOS applications. The API installs into Apple mobile applications or apps …

Don't miss

Cybersecurity news