Please turn on your JavaScript for this page to function normally.
90% of employees use personal devices for work

IT managers feel they lack the necessary tools to properly manage personal devices. A new survey by DELL Kace revealed 87 percent of companies have employees that use some …

HTML5-based mobile security platform

AirWatch released an HTML5-based MDM platform. By leveraging HTML5, AirWatch’s management console is now even more accessible from any web-connected device, regardless …

Mobile malware criminal command-and-control activity

Criminal operators continue to hone their craft in 2011 using crimeware that can be repurposed for multiple fraud opportunities, sold or leased to other criminals, and that is …

Protect data on shared information networks

Unisys announced its Stealth Solution for Secure Virtual Terminal (SSVT), a secure solution residing on a federal government-certified USB device to help ensure that a mobile …

SDHC memory card with wireless LAN

Toshiba will launch an SDHC memory card with embedded wireless LAN functionality to meet the SD Memory Card Standard. The new card, “FlashAir”, has an 8GB capacity …

USB 3.0 flash drive with 2 TB of storage

Transcend and ITRI unveiled a small USB stick that can offer up to 2 TB of storage.

Chinese mobile phone monitoring service found

What do you think cyber crooks do with the information collected from mobile phones by malware? Trend Micro has one of the answers to that question. Its researchers have …

PoC keylogger app for smartphones revealed

We are all familiar with keyloggers – software that registers and identifies the keys pressed by a computer user – and its prevalently malicious uses. One of the …

New way of mobile security policy enforcement

AirPatrol unveiled ZoneDefense, a new mobile monitoring and policy enforcement technology that lets enterprises support the use of consumer and mobile devices on premises …

Android malware masquerading as love test app

Online Chinese third party app stores are a treasure trove of Android malware which hides under many guises. Their goal is often the same: get permission from the user to send …

Half of organizations lost information on USB drives

Inexpensive consumer USB Flash drives are ubiquitous in all manner of enterprise and government environments – typically with very little oversight or controls, even in …

Protecting mobile phones? Most don’t bother

Although almost a quarter of consumers (22%) have lost a mobile phone in the past, and a further 12% have had a phone stolen, 67% don’t have passwords set up on their …

Don't miss

Cybersecurity news