mobile devices
Michigan police downloading drivers’ phone data without warrants?
For a few years now, the Michigan State Police has been using portable devices that allow them to secretly extract personal information from cell phones of drivers who have …
Secure access for any device with Cisco
Cisco introduced new security, management, and video solutions to its Borderless Networks portfolio to help information technology departments more efficiently manage the …
Managed government-level secure USB from Kingston
Kingston announced the DataTraveler 4000-M Managed (DT4000-M) USB Flash drive, a fully managed version of the company’s DataTraveler 4000 product. Specifically developed …
Self-wiping hard drives from Toshiba
Toshiba announces a family of self-encrypting hard disk drives (HDDs) engineered to automatically invalidate protected data when connected to an unknown host. The new Toshiba …
Hacking Unified Communications security
A fundamental shift in the IT security world has taken place. It is the common thread running through these real-world case studies: 1. An enterprise telecoms manager at a …
Privacy violations by popular mobile apps under investigation
An ongoing grand-jury investigation has revealed that many mobile applications could be sending various user information to advertising networks without the users’ …
Smartphone users feel more secure than PC users
Many users feel more secure using smartphones to surf the Internet than PCs, and a majority consider the risk of losing personal data higher on computers than on smartphones, …
The smartphone: A real bug in your bed
The rise of the smartphone over the past few years has been a technology success story. An almost perfect storm of advancing materials science, chip set development, software …
How to wipe personal information off your mobile phone
People are unsuspectingly selling their personal information to complete strangers as a new report from CPP finds half (54%) of second hand mobile phones contain extensive …
Second hand phones contain extensive personal data
People are unsuspectingly selling their personal information to complete strangers as a new report from CPP finds half (54%) of second hand mobile phones contain extensive …
Malicious app found in Android Market
To infect a mobile device, the Rootcager/DroidDream Trojan used two known exploits: exploid and rageagainstthecage. If the first one failed to root the device, the malware …
Security concerns around “backdoor” mobile devices
Employee owned, “backdoor’ mobile devices entering the corporate network highlight ongoing security challenges with enterprise mobility, according to Mformation. …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD