mobile devices
BYOD: Better stay used to it
BYOD is a common trend in organizations today. Businesses may be thrilled they don’t have to pay for tablets or smartphones for their workforce and don’t usually …
16 million mobile devices infected by malware
Security threats to mobile and residential devices and attacks on communications networks rose in 2014, threatening personal and corporate privacy and information. …
How public Wi-Fi puts unprotected users at risk
76% of American smartphone and tablet users are at risk of privacy loss and identity theft via public Wi-Fi networks. The risk of using public Wi-Fi without a protected …
Unsurprisingly, adults don’t read terms and conditions of mobile apps
Today, we spend more time on our smartphones and tablets than ever before, downloading games on the go, banking online or conducting the weekly grocery shop. However, despite …
Five key IT security trends for 2015
Here’s a look at five key IT security trends and solutions for 2015. Rise in security breaches The current high level of security breaches, from the largest organization …
Android Wi-Fi Direct DoS vulnerability discovered
Some Android devices are affected by a Denial of Service attack when scanning for WiFi Direct devices, according to Andres Blanco from the CoreLabs Team. An attacker could …
Why leaving a shared device unprotected is dangerous
According to a survey jointly executed by B2B International and Kaspersky Lab, 32 per cent of respondents who share an Internet-enabled device with their relatives, colleagues …
79% of professionals do business on personal devices
As employees increasingly demand a more mobile and social workplace, the pressure is on for enterprises to deliver the same technology experience employees have in their …
Biometric authentication app downloads to reach 770 million by 2019
More than 770 million biometric authentication applications will be downloaded per annum by 2019, up from just 6 million this year. This will reduce dependence on alphanumeric …
Unlock your digital world with True Key
Intel Security recently previewed True Key, a new way to unlock your digital world. It combines both password management with simple and secure multi-factor …
The hidden dangers of third party code in free apps
Research from MWR InfoSecurity has shown the various ways hackers can abuse ad networks by exploiting vulnerabilities in free mobile apps. When people install and use free …
Trends in Internet trust exploits, IoT, cyber espionage and privacy
In the third quarter, McAfee Labs detected more than 307 new threats every minute, or more than five every second, with mobile malware samples growing by 16 percent during the …
Featured news
Resources
Don't miss
- Chinese cyber spies are using Ivanti EPMM flaws to breach EU, US organizations
- TikTok videos + ClickFix tactic = Malware infection
- DanaBot botnet disrupted, QakBot leader indicted
- Is privacy becoming a luxury? A candid look at consumer data use
- Unpatched Windows Server vulnerability allows full domain compromise