mobile devices
Mobile malware up 163%
Mobile malware threats increased 163% to more than 65,000 in 2012, according to NQ Mobile. The problem is becoming more complex as smarter mobile malware can better target …
Rackspace launches Mobile Cloud Stacks
Rackspace released its new mobile cloud stacks for developers. These stacks are purpose built to help developers design, build, test, deploy and scale mobile apps in the …
Beyond BYOD: Companies need to change
Organizations seeking to maximize the economic and productivity benefits made possible by mobile technologies must look beyond simply which devices are used and re-examine …
Secure Microsoft Office collaboration via any device
WatchDox Apps for WatchDox Enterprise and Enterprise ES is the first offering to grant enterprise users secure Microsoft Office collaboration capabilities via any desktop, …
Security professionals don’t have secure mobile habits
Security professionals have embraced BYOD and they’re taking “anytime, anywhere” access to some pretty interesting locations according a new survey by Ping …
The security risks of using Wi-Fi on the Tube
The arrival of widespread public Wi-Fi access across London Underground has been broadly welcomed by the general public, particularly those with smartphones and tablets who …
Route1 releases MobiKEY for iPad
Route1 released MobiKEY technology for the iPad. MobiKEY is a complete desktop, secure remote access technology that integrates multi-factor authentication and identity …
Complex malware and BYOD drive mobile security
Mobile malware has advanced to a new level of sophistication as smart devices continue to gain ground. The number of unique mobile threats grew by 261% in just two quarters. …
A look at how consumers safeguard their devices
While consumers who have lost a smartphone or had one stolen in the past are significantly more likely to be taking basic protective measures with their current device, nearly …
Mobile device data recoveries surge
Kroll Ontrack saw a 55 percent increase in mobile device recoveries for phones and tablets from 2010 to 2011, and a 161 percent increase from 2011 to 2012. With more and more …
Apple adds two-step verification option to iCloud accounts
Apple has finally introduced a two-step verification feature that will allow its users to secure their iCloud (Apple ID) accounts, 9 to 5 Mac reports. The option is currently …
Researcher points out critical Samsung Android phone vulnerabilities
Tired of waiting for Samsung to fix a string of critical flaws in their smartphones running Android, Italian security researcher Roberto Paleari has decided to inform the …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)