Please turn on your JavaScript for this page to function normally.
Security-oriented Blackphone specifications published

SGP Technologies SA, the Switzerland-based joint venture of Silent Circle and Geeksphone behind Blackphone, announced the specifications of its eagerly awaited privacy-minded …

CoSoSys updates Endpoint Protector 4

At Infosecurity Europe 2014 in London today, CoSoSys updated the Endpoint Protector 4 platform, which provides IT administrators with improved Content Aware Protection …

Free Heartbleed scanner for Chrome and Android

To help Internet users protect themselves from the Heartbleed bug that is eroding SSL security features on websites worldwide, Trend Micro released two free Heartbleed …

Samsung Galaxy S5 fingerprint scanner can be tricked

Samsung’s newly released Galaxy S5 phone sports a fingerprint scanner embedded in the home button that works well but unfortunately, like iPhone 5S’ TouchID before …

Securing mobile applications

In this interview, Dan Cornell, Principal of Denim Group, talks about the most common pitfalls of securing mobile applications, discusses the challenges involved in performing …

Samsung Galaxy enterprise mobility management

Codeproof announced the availability of Enterprise Mobility Management (EMM) for Samsung Galaxy line of devices within its cloud based management platform. “Over the …

Mobile data leakage

Attack vectors in the mobile world are related to apps, content and web. In this podcast recorded at RSA Conference 2014, Mike Raggo, Security Evangelist at MobileIron, …

Trends shaping mobile forensics in 2014

Mobile forensic provider Cellebrite surveyed its customer base and conducted interviews with leading mobile forensic experts and analysts spanning the industry, asking their …

Protecting APIs, mobile apps and cloud services

CA Technologies announced new and updated identity-based solutions to help secure the increasing number of cloud, web and mobile applications operating in today’s open …

Mobile threats around the world

2013 was a year of change in the world of mobile threats. Campaigns became increasingly targeted as criminals adapted their practices to maximize profit and operate under the …

70% Android devices vulnerable to released remote access exploit

The recent release of a Metasploit module that allows attackers to remotely access (“get shell”) on most Android-running devices has again raised a very good …

Transfer and backup content with a dual USB drive from SanDisk

SanDisk announced the SanDisk Ultra Dual USB Drive, a USB flash drive featuring both a micro-USB and a USB 2.0 connector in a sleek and sturdy form factor. It is designed for …

Don't miss

Cybersecurity news