mobile devices
Security-oriented Blackphone specifications published
SGP Technologies SA, the Switzerland-based joint venture of Silent Circle and Geeksphone behind Blackphone, announced the specifications of its eagerly awaited privacy-minded …
CoSoSys updates Endpoint Protector 4
At Infosecurity Europe 2014 in London today, CoSoSys updated the Endpoint Protector 4 platform, which provides IT administrators with improved Content Aware Protection …
Free Heartbleed scanner for Chrome and Android
To help Internet users protect themselves from the Heartbleed bug that is eroding SSL security features on websites worldwide, Trend Micro released two free Heartbleed …
Samsung Galaxy S5 fingerprint scanner can be tricked
Samsung’s newly released Galaxy S5 phone sports a fingerprint scanner embedded in the home button that works well but unfortunately, like iPhone 5S’ TouchID before …
Securing mobile applications
In this interview, Dan Cornell, Principal of Denim Group, talks about the most common pitfalls of securing mobile applications, discusses the challenges involved in performing …
Samsung Galaxy enterprise mobility management
Codeproof announced the availability of Enterprise Mobility Management (EMM) for Samsung Galaxy line of devices within its cloud based management platform. “Over the …
Mobile data leakage
Attack vectors in the mobile world are related to apps, content and web. In this podcast recorded at RSA Conference 2014, Mike Raggo, Security Evangelist at MobileIron, …
Trends shaping mobile forensics in 2014
Mobile forensic provider Cellebrite surveyed its customer base and conducted interviews with leading mobile forensic experts and analysts spanning the industry, asking their …
Protecting APIs, mobile apps and cloud services
CA Technologies announced new and updated identity-based solutions to help secure the increasing number of cloud, web and mobile applications operating in today’s open …
Mobile threats around the world
2013 was a year of change in the world of mobile threats. Campaigns became increasingly targeted as criminals adapted their practices to maximize profit and operate under the …
70% Android devices vulnerable to released remote access exploit
The recent release of a Metasploit module that allows attackers to remotely access (“get shell”) on most Android-running devices has again raised a very good …
Transfer and backup content with a dual USB drive from SanDisk
SanDisk announced the SanDisk Ultra Dual USB Drive, a USB flash drive featuring both a micro-USB and a USB 2.0 connector in a sleek and sturdy form factor. It is designed for …
Featured news
Sponsored
Don't miss
- Ransomware in Q1 2024: Frequency, size of payments trending downwards, SMBs beware!
- LastPass users targeted by vishing attackers
- Protobom: Open-source software supply chain tool
- The key pillars of domain security
- Ivanti patches critical Avalanche flaw exploitable via a simple message (CVE-2024-29204)