Please turn on your JavaScript for this page to function normally.
Michigan police downloading drivers’ phone data without warrants?

For a few years now, the Michigan State Police has been using portable devices that allow them to secretly extract personal information from cell phones of drivers who have …

Secure access for any device with Cisco

Cisco introduced new security, management, and video solutions to its Borderless Networks portfolio to help information technology departments more efficiently manage the …

Managed government-level secure USB from Kingston

Kingston announced the DataTraveler 4000-M Managed (DT4000-M) USB Flash drive, a fully managed version of the company’s DataTraveler 4000 product. Specifically developed …

Self-wiping hard drives from Toshiba

Toshiba announces a family of self-encrypting hard disk drives (HDDs) engineered to automatically invalidate protected data when connected to an unknown host. The new Toshiba …

Hacking Unified Communications security

A fundamental shift in the IT security world has taken place. It is the common thread running through these real-world case studies: 1. An enterprise telecoms manager at a …

Privacy violations by popular mobile apps under investigation

An ongoing grand-jury investigation has revealed that many mobile applications could be sending various user information to advertising networks without the users’ …

Smartphone users feel more secure than PC users

Many users feel more secure using smartphones to surf the Internet than PCs, and a majority consider the risk of losing personal data higher on computers than on smartphones, …

The smartphone: A real bug in your bed

The rise of the smartphone over the past few years has been a technology success story. An almost perfect storm of advancing materials science, chip set development, software …

How to wipe personal information off your mobile phone

People are unsuspectingly selling their personal information to complete strangers as a new report from CPP finds half (54%) of second hand mobile phones contain extensive …

Second hand phones contain extensive personal data

People are unsuspectingly selling their personal information to complete strangers as a new report from CPP finds half (54%) of second hand mobile phones contain extensive …

Malicious app found in Android Market

To infect a mobile device, the Rootcager/DroidDream Trojan used two known exploits: exploid and rageagainstthecage. If the first one failed to root the device, the malware …

Security concerns around “backdoor” mobile devices

Employee owned, “backdoor’ mobile devices entering the corporate network highlight ongoing security challenges with enterprise mobility, according to Mformation. …

Don't miss

Cybersecurity news