Help Net Security
Secure View 3 recovers deleted data from Android phones
Susteen’s Secure View 3 digital forensics product is now able to recover deleted data from the large majority of Android phones. Law enforcement, military and government …
Infographic: “How companies track you on the Web”
Veracode’s new infographic illustrates how privacy transference has evolved into a major problem for consumers who willingly give information to businesses online, but …
How to stay secure in a changing world
In Sir Isaac Newton’s time there were three laws of motion, which dominated the scientific view of the world. While he, and his scientific peers, might have had many …
Alarming number of merchants unaware of PCI DSS
The last four years have been marked by continued growth in small business data compromise, yet small business owners are still missing the point of the PCI DSS, a ControlScan …
Secure data-at-rest and data-in-motion on iOS and Android
Companies are moving their core business operations to mobile apps. App developers are at the center of this transformation and must deliver great apps quickly while ensuring …
Seagate Backup Plus gets USB 3.0
Seagate introduced SuperSpeed USB 3.0 to Backup Plus storage for Mac. This new interface means faster transfer of data, so you can backup more quickly, up to 10x that of USB …
Lock your Mac with QuickLock
QuickLock is a customizable way to lock your Mac. Unlike OSX’s hot corners, QuickLock works with a simple keyboard shortcut or menubar click, and never gets in the way …
ASUS unveils RT-N12HP wireless router
To serve home and office users who need wider wireless coverage, the ASUS RT-N12HP high-power wireless-N300 router employs detachable 9dBi antennas and a unique hardware …
Mac OS X and iOS Internals
Powering Macs, iPhones, iPads and more, OS X and iOS are becoming ubiquitous. When it comes to documentation, however, much of them are shrouded in mystery. Cocoa and Carbon, …
Most Android malware are SMS Trojans
Android versions 2.3.6, or ‘Gingerbread’, and 4.0.4, also known as ‘Ice Cream Sandwich’ were the most popular Android targets among cybercriminals in …
Trust in the cloud or trust in the phone: What next for mobile payments?
Thales looks at the approaches for the successful mass adoption of mobile payments among issuers, card schemes, acquirers, merchants and consumers and asks whether the arrival …
Mobile Device Management for iOS and Android devices
CoSoSys released Mobile Device Management (MDM) for iOS and Android as a new module within Endpoint Protector 4.3 including support for iOS 6. “With Mobile Device …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems