mobile devices
In-house control and encrypted voice calls
Cellcrypt announced Cellcrypt Private Switch, a private network that allows an organization’s administrators complete privacy over user identity and calling activity. …
Assess and score mobile application and device risks
Agiliance unveiled the new Agiliance Mobile Trust Service, an extension of the company’s Agiliance RiskVision platform, enables organizations to address mobile and BYOD …
IT consumerization still a threat
Despite the growing consumerisation of IT, the majority (63 per cent) of employees in the UK say that corporate IT is failing to secure all personal devices brought into the …
Mobile application reputation service from Veracode
Veracode is expanding upon its enterprise application security services to include mobile application intelligence. The introduction of Mobile Application Reputation Service …
Most businesses experienced a mobile security incident
79% of businesses had a mobile security incident in the past year, in many cases incurring substantial costs, according to Check Point. The report found mobile security …
Managed services for web, cloud and mobile app security
Cenzic has expanded its Cenzic Managed Services for Enterprise Application Security which now includes four levels of service including a special compliance-ready assessment …
Employees continue to use risky apps on mobile devices
Risky applications and business applications are being used side-by-side on devices owned by employees that are used for work, according to a survey by the SANS Institute. …
Parents should be concerned about app security
Veracode released an infographic outlining the importance of mobile application security for children. It provides parents with tips for protecting their children, their …
Addonics releases CipherUSB family of hardware encryption solutions
Addonics Technologies announced a family of USB hardware encryption solutions that protect data stored on hard drives, removable drives, flash media, optical media or in the …
Can mobile malware be activated via sensors?
Can mobile malware be activated via sensors available on current mobile devices, and receive commands through out-of-band communication methods? If you ask a group of …
Fighting cybercrime is on the right track
Despite the numerous security incidents that took place during the first quarter of the year, the fight against cyber-crime is on the right track, according to PandaLabs. …
Wi-Fi client security weaknesses still prevalent
Google Android, Apple iOS, BlackBerry, and Windows Mobile devices have an inherent security weakness in the method they use for connecting to Wi-Fi networks that has the …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware