Please turn on your JavaScript for this page to function normally.
Android apps
Through inter-app data sharing, Android apps can get your data without permission

With a newly developed toolsuite that can analyze Android apps and detect whether two or more of them can collude with each other to acquire information that they would …

HITBSecConf
Researchers to present new software and hardware vulnerabilities at HITB Amsterdam

Users assume the underlying hardware and software system, mobile antivirus, password managers and encryption technology will protect them from malicious attacks on their …

authentication
Online banking customers remain extremely frustrated with passwords

A new survey by iovation and Aite Group, polled nearly 1,100 consumers across four generations who use online and/or mobile banking platforms to better understand their …

airplane
US to ban electronic devices from airplane cabins on some US-bound flights

With a (now deleted) tweet, Royal Jordanian Airlines has jumped the gun on a new ban by the US government expected to be announced on Tuesday: air travellers to the US from …

Tech
Mobile workers continually expose organizations to security risks

29 percent of organisations have already experienced either a data loss or breach as a direct result of mobile working, according to research conducted by Vanson Bourne. As …

speed
The evolution of cloud and mobile security

In this podcast recorded at RSA Conference 2017, Salim Hafid, Product Marketing Manager at Bitglass, talks about how organizations are dealing with BYOD, cloud security, and …

mobile device
500,000+ devices have dangerous apps installed

At Mobile World Congress (MWC) 2017, connected cars, the future of smart homes and, of course, the newest handsets are top of the agenda. Intel Security’s latest findings show …

smartphone
Consumers regularly share passcodes, creating compromising situations

Consumers keep more and more sensitive personal and professional information on their mobile phones, but most people remain alarmingly casual about adequately protecting that …

BYOD
Employees rely largely on personally owned mobile devices in the workplace

Mobile device adoption in the workplace is not yet mature, found a recent survey from Gartner. Although 80 percent of workers surveyed received one or more corporate-issued …

gift
This year’s most hackable holiday gifts

Intel Security announced its second annual McAfee Most Hackable Holiday Gifts list to identify potential security risks associated with hot-ticket items this holiday season. …

Wi-Fi
Mobile pros are addicted to Wi-Fi, connectivity impacts their choices

iPass surveyed more than 1,700 mobile professionals worldwide about their connectivity habits and preferences, highlighting the ever-increasing influence of Wi-Fi on our daily …

iStorage diskAshur Pro
Review: iStorage diskAshur Pro SSD

The iStorage diskAshur Pro SSD is the hard drive for users with security on their mind. This USB 3.0 device comes in various storage capacities, ranging from 128GB to 1TB, and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools