Please turn on your JavaScript for this page to function normally.
Why leaving a shared device unprotected is dangerous

According to a survey jointly executed by B2B International and Kaspersky Lab, 32 per cent of respondents who share an Internet-enabled device with their relatives, colleagues …

79% of professionals do business on personal devices

As employees increasingly demand a more mobile and social workplace, the pressure is on for enterprises to deliver the same technology experience employees have in their …

Biometric authentication app downloads to reach 770 million by 2019

More than 770 million biometric authentication applications will be downloaded per annum by 2019, up from just 6 million this year. This will reduce dependence on alphanumeric …

Unlock your digital world with True Key

Intel Security recently previewed True Key, a new way to unlock your digital world. It combines both password management with simple and secure multi-factor …

The hidden dangers of third party code in free apps

Research from MWR InfoSecurity has shown the various ways hackers can abuse ad networks by exploiting vulnerabilities in free mobile apps. When people install and use free …

Trends in Internet trust exploits, IoT, cyber espionage and privacy

In the third quarter, McAfee Labs detected more than 307 new threats every minute, or more than five every second, with mobile malware samples growing by 16 percent during the …

Why you should protect your wireless connection

It’s holiday shopping season again, and consumers will join the rush to buy devices and accessories for loved ones. They’ll scoop up phones and tablets, plus …

Mobile Pwn2Own 2014: Windows Phone’s sandbox resists attack

The Mobile Pwn2Own 2014 hacking competition, held at the PacSec Applied Security Conference in Tokyo, Japan, was concluded on Thursday, and not one of the targeted phones has …

Many IT pros store compromising material on their mobile phones

It appears that Jennifer Lawrence is not the only one with risqué photos on her mobile device. According to a new survey from ESET, 39 percent of the UK’s leading IT …

Mobile security breaches impacted 68% of organizations

Mobile security breaches have affected 68 percent of organizations in the last 12 months, according to a new global study from BT. Despite this, organizations are still not …

Extracting data from air-gapped computers via mobile phones

A group of researchers from the Department of Information Systems Engineering at Ben-Gurion University in Israel have demonstrated and detailed a technique that can allow …

Over one-third of all enterprise data leakage policy violations occur on mobile devices

Nearly half of all cloud app activities and more than one-third of all data leakage policy violations occur on mobile devices, say the results of the October 2014 Netskope …

Don't miss

Cybersecurity news